<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
<url>
<loc>https://gengstah.github.io/posts/2025/09/tp-link-1/</loc>
<lastmod>2025-09-04T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://gengstah.github.io/posts/2025/11/patch-tuesday/</loc>
<lastmod>2025-11-11T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://gengstah.github.io/posts/2025/11/osee/</loc>
<lastmod>2025-11-26T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://gengstah.github.io/posts/2025/12/patch-tuesday/</loc>
<lastmod>2025-12-10T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://gengstah.github.io/posts/2026/05/arp-over-gtk/</loc>
<lastmod>2026-05-02T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://gengstah.github.io/wiki/attacks/abusing-gtk/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/attacks/arp-over-gtk/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/attacks/arp-spoofing/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/attacks/auxiliary-techniques/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/attacks/broadcast-reflection/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/attacks/dragonblood/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/attacks/fragattacks/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/attacks/framing-frames/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/attacks/gateway-bouncing/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/attacks/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/attacks/krack/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/attacks/machine-on-the-side/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/attacks/mfp-deauthentication/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/attacks/passpoint-flaws/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/attacks/peap-bypass/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/attacks/pixie-dust-wps/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/attacks/port-stealing/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/attacks/rogue-ap/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/attacks/ssid-confusion/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/attacks/tunnelcrack/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/concepts/802-11-standards/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/concepts/80211-frame-types/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/concepts/8021x/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/concepts/action-frames/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/concepts/active-directory-attacks/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/concepts/ai-agents-offensive/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/concepts/airsnitch-overview/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/concepts/amsdu-ampdu/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/concepts/applocker-abuse/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/concepts/arp/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/concepts/authentication-association/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/concepts/beacon-frames/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/concepts/beacon-object-files/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/concepts/bind-link-edr-tampering/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/concepts/bss-coloring/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/concepts/bssid-ssid-ess/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/concepts/buffer-overflow/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/concepts/captive-portals/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/concepts/ccmp-gcmp/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/concepts/chrome-ntlm-hash-leak/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/concepts/client-isolation/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/concepts/cloud-penetration-testing/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/concepts/command-and-control/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/concepts/credential-guard-bypass/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/concepts/cyber-kill-chain/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/concepts/dll-hijacking/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/concepts/dpp-easy-connect/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/concepts/eap-framework/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/concepts/eap-pwd/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/concepts/eap-tls/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/concepts/edr-silencing/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/concepts/evasion-techniques/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/concepts/external-c2/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/concepts/fast-bss-transition/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/concepts/gac-hijacking/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/concepts/grimresource-msc/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/concepts/handshakes/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/concepts/html-smuggling/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/concepts/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/concepts/jwt-attacks/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/concepts/kerberoasting/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/concepts/kubernetes-pentesting/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/concepts/lateral-movement/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/concepts/linux-process-injection/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/concepts/lnk-file-attacks/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/concepts/lsass-dumping/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/concepts/macos-jit-shellcode/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/concepts/mark-of-the-web/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/concepts/mdt-credential-extraction/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/concepts/mfp/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/concepts/mitre-attack/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/concepts/mobile-security/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/concepts/monitor-mode-injection/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/concepts/network-scanning/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/concepts/notepadplusplus-abuse/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/concepts/ofdm-ofdma/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/concepts/offensive-python/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/concepts/office-macro-tradecraft/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/concepts/opsec/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/concepts/owe/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/concepts/pass-the-hash/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/concepts/passpoint/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/concepts/peap-ttls/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/concepts/phishing/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/concepts/post-exploitation/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/concepts/power-save-tim-dtim/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/concepts/privilege-escalation-linux/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/concepts/privilege-escalation-windows/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/concepts/probe-requests-pnl/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/concepts/purple-teaming/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/concepts/radio-resource-mgmt/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/concepts/radius/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/concepts/reconnaissance/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/concepts/red-teaming/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/concepts/rsn-information-element/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/concepts/sae-dragonfly/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/concepts/secure-enclaves-offensive/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/concepts/social-engineering/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/concepts/sql-injection/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/concepts/toast-notifications-abuse/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/concepts/twt/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/concepts/virtual-ports/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/concepts/vpn-abuse-windows/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/concepts/vsto-phishing/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/concepts/vulnerability-assessment/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/concepts/web-application-testing/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/concepts/wep/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/concepts/wi-fi-client-isolation-bypass/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/concepts/wifi-direct-tdls/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/concepts/wifi-frequency-bands/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/concepts/wifi-key-hierarchy/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/concepts/wifi-mesh/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/concepts/windows-exploit-research-overview/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/concepts/windows-service-triggers/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/concepts/wireless-attacks/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/concepts/wnm-anqp/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/concepts/wpa-versions/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/concepts/wps/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/concepts/wsus-attacks/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/concepts/xss/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/cves/CVE-2020-1350/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/cves/CVE-2020-16898/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/cves/CVE-2021-24086/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/cves/CVE-2021-24094/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/cves/CVE-2021-31956/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/cves/CVE-2021-31969/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/cves/CVE-2022-21907/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/cves/CVE-2022-22715/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/cves/CVE-2022-24521/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/cves/CVE-2022-34718/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/cves/CVE-2022-37969/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/cves/CVE-2023-23376/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/cves/CVE-2023-28218/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/cves/CVE-2023-28229/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/cves/CVE-2023-28252/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/cves/CVE-2023-36802/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/cves/CVE-2024-21338/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/cves/CVE-2024-26170/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/cves/CVE-2024-26230/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/cves/CVE-2024-30084/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/cves/CVE-2024-30085/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/cves/CVE-2024-30088/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/cves/CVE-2024-30090/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/cves/CVE-2024-35250/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/cves/CVE-2024-38063/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/cves/CVE-2024-38238/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/cves/CVE-2024-38245/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/cves/CVE-2024-49138/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/cves/CVE-2025-21333/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/cves/CVE-2025-29824/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/cves/CVE-2025-30385/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/cves/CVE-2025-32701/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/cves/CVE-2025-53136/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/cves/CVE-2025-60709/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/cves/CVE-2025-60719/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/cves/CVE-2025-62215/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/cves/CVE-2025-8061/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/cves/CVE-2026-20820/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/cves/CVE-2026-31431/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/cves/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/defenses/centralized-decryption/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/defenses/documentation/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/defenses/dynamic-arp-inspection/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/defenses/endpoint-arp-hardening/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/defenses/filter-unicast-in-broadcast/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/defenses/group-key-randomization/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/defenses/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/defenses/macsec/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/defenses/spoofing-prevention/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/defenses/vlans/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/devices/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/devices/tested-devices/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/domains/exploit-development/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/domains/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/domains/penetration-testing/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/domains/red-teaming/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/domains/vulnerability-research/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/kernel/architecture/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/kernel/cimfs/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/kernel/cldflt/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/kernel/clfs/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/kernel/clfs_authentication/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/kernel/directx/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/kernel/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/kernel/ioring/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/kernel/kernel_streaming/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/kernel/minifilter/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/kernel/mitigations/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/kernel/pool_internals/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/kernel/primitives/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/kernel/tcpip_stack/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/kernel/vtl_secure_calls/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/kernel/wnf_internals/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/log/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/overview/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/playbooks/active-directory-pentest/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/playbooks/external-pentest/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/playbooks/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/playbooks/internal-network-pentest/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/playbooks/web-app-pentest/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/resources/cve_template/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/resources/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/resources/outflank/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/resources/papers_and_blogs/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/resources/reading-list/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/resources/researchers-wer/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/resources/researchers/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/schema/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/sources/airsnitch/airsnitch-readme/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/sources/airsnitch/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/sources/airsnitch/ndss2026-airsnitch-paper/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/sources/airsnitch/ndss2026-paper/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/sources/blog/2026-05-02-arp-over-gtk/</loc>
<lastmod>2026-05-02T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://gengstah.github.io/wiki/sources/blog/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/sources/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/sources/offsec/abusing-windows-built-in-vpn-providers/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/sources/offsec/accelerating-offensive-r-d-with-llms/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/sources/offsec/airsnitch-demystifying-and-breaking/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/sources/offsec/apc-injection/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/sources/offsec/applocker-rules-abuse/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/sources/offsec/async-bofs-wake-me-up-before-you-go-go/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/sources/offsec/attacking-jwt-using-x509-certificates/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/sources/offsec/bind-link-edr-tampering/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/sources/offsec/bof-linting-for-accelerated-development/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/sources/offsec/callback-code-execution/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/sources/offsec/coding-basics/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/sources/offsec/command-line-underdog-wmic-in-action/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/sources/offsec/common-mobile-device-threat-vectors/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/sources/offsec/credential-guard/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/sources/offsec/cve-2025-1729-privilege-escalation-using-tpqmassistant-exe/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/sources/offsec/detecting-active-directory-password-spraying-with-a-honeypot-account/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/sources/offsec/detection-mechanisms/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/sources/offsec/dragging-secrets-out-of-chrome-ntlm-hash-leaks-via-file-urls/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/sources/offsec/dynamic-link-library/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/sources/offsec/early-bird-apc-injection/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/sources/offsec/edr-silencing/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/sources/offsec/evading-microsoft-defender-static-analysis/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/sources/offsec/gac-hijacking/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/sources/offsec/hack-cessibility-when-dll-hijacks-meet-windows-helpers/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/sources/offsec/helpful-hints-for-writing-and-editing-cybersecurity-reports/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/sources/offsec/hunting-deserialization-vulnerabilities-with-claude/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/sources/offsec/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/sources/offsec/introduction-to-payload-encryption/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/sources/offsec/introduction-to-the-windows-api/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/sources/offsec/keys-to-jwt-assessments-from-a-cheat-sheet-to-a-deep-dive/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/sources/offsec/kubernetes-for-pentesters-part-1/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/sources/offsec/linux-process-injection-via-seccomp-notify/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/sources/offsec/lnkmemaybe-a-review-of-cve-2026-25185/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/sources/offsec/local-function-stomping-injection/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/sources/offsec/local-mapping-injection/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/sources/offsec/local-payload-execution-1/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/sources/offsec/local-payload-execution/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/sources/offsec/lsass-dump-windows-error-reporting/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/sources/offsec/macos-jit-memory/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/sources/offsec/maldev-academy-tool-1/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/sources/offsec/maldev-academy-tool/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/sources/offsec/malware-binary-signing/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/sources/offsec/mcp-an-introduction-to-agentic-op-support/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/sources/offsec/microsoft-speech/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/sources/offsec/notepad-plugins-plug-and-payload/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/sources/offsec/operating-inside-the-interpreted-offensive-python/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/sources/offsec/patchguard-peekaboo-hiding-processes-on-systems-with-patchguard-in-2026/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/sources/offsec/payload-encryption-1/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/sources/offsec/payload-encryption-aes-encryption/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/sources/offsec/payload-encryption/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/sources/offsec/payload-execution-control/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/sources/offsec/payload-obfuscation-1/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/sources/offsec/payload-obfuscation-2/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/sources/offsec/payload-obfuscation/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/sources/offsec/payload-placement-data-rdata-sections/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/sources/offsec/payload-placement-rsrc-section/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/sources/offsec/payload-placement-text-section/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/sources/offsec/payload-staging-web-server/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/sources/offsec/payload-staging-windows-registry/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/sources/offsec/portable-executable-format/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/sources/offsec/process-argument-spoofing-1/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/sources/offsec/process-argument-spoofing-2/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/sources/offsec/process-enumeration-1/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/sources/offsec/process-enumeration/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/sources/offsec/process-injection-dll-injection/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/sources/offsec/process-injection-shellcode-injection/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/sources/offsec/purpling-your-ops/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/sources/offsec/red-team-gold-extracting-credentials-from-mdt-shares/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/sources/offsec/remote-function-stomping-injection/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/sources/offsec/remote-mapping-injection/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/sources/offsec/required-tools/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/sources/offsec/spoofing-ppid/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/sources/offsec/there-s-more-than-one-way-to-trigger-a-windows-service/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/sources/offsec/thread-hijacking-local-thread-creation/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/sources/offsec/thread-hijacking-local-thread-enumeration/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/sources/offsec/thread-hijacking-remote-thread-creation/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/sources/offsec/thread-hijacking-remote-thread-enumeration/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/sources/offsec/toast-notifications/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/sources/offsec/training-specialist-models/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/sources/offsec/undocumented-structures/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/sources/offsec/windows-architecture/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/sources/offsec/windows-memory-management/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/sources/offsec/windows-processes/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/sources/offsec/wsus-is-sus-ntlm-relay-attacks-in-plain-sight/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/sources/windows-exploit-research/a-trick-the-story-of-cve-2024-26230/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/sources/windows-exploit-research/all-i-want-for-christmas-is-a-cve-2024-30085-exploit/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/sources/windows-exploit-research/analysis-of-a-windows-ipv6-fragmentation-vulnerability-cve-2021-24086/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/sources/windows-exploit-research/analysis-of-microsoft-cve-2022-21907/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/sources/windows-exploit-research/anatomy-of-an-exploit-rce-with-sigred/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/sources/windows-exploit-research/break-me-out-of-sandbox-in-old-pipe-cve-2022-22715-windows-dirty-pipe/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/sources/windows-exploit-research/cve-2020-16898-exploiting-bad-neighbor-vulnerability-pi3-blog/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/sources/windows-exploit-research/cve-2021-31956-exploiting-the-windows-kernel-ntfs-with-wnf-part1/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/sources/windows-exploit-research/cve-2021-31956-exploiting-the-windows-kernel-ntfs-with-wnf-part2/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/sources/windows-exploit-research/cve-2024-26230-windows-telephony-service-it-s-got-some-call-ing-issues-elevation/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/sources/windows-exploit-research/cve-2024-38063-critical-analysis/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/sources/windows-exploit-research/cve-2024-38063-remotely-exploiting-the-kernel-via-ipv6/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/sources/windows-exploit-research/cve-2024-38063-windows-tcp-ip-vulnerability-explained/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/sources/windows-exploit-research/cve-2026-20820-root-cause-analysis/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/sources/windows-exploit-research/deep-dive-into-cve-2025-29824-in-windows/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/sources/windows-exploit-research/directx-to-the-kernel/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/sources/windows-exploit-research/dissecting-and-exploiting-tcp-ip-rce-vulnerability-evilesp/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/sources/windows-exploit-research/exploit-development-browser-exploitation-on-windows-cve-2019-0567-a-microsoft-ed/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/sources/windows-exploit-research/exploit-development-investigating-kernel-mode-shadow-stacks-on-windows/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/sources/windows-exploit-research/exploit-reversing-01/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/sources/windows-exploit-research/exploit-reversing-02/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/sources/windows-exploit-research/exploit-reversing-05/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/sources/windows-exploit-research/exploit-reversing-06/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/sources/windows-exploit-research/exploit-reversing-07/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/sources/windows-exploit-research/exploit-reversing-08/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/sources/windows-exploit-research/exploitation-of-a-kernel-pool-overflow-from-a-restrictive-chunk-size-cve-2021-31/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/sources/windows-exploit-research/exploiting-wrmsr-in-vulnerable-drivers/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/sources/windows-exploit-research/frame-by-frame-kernel-streaming-keeps-giving-vulnerabilities/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/sources/windows-exploit-research/from-urgent-11-to-frag-44-analysis-of-critical-vulnerabilities-in-the-windows-tc/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/sources/windows-exploit-research/hn-security-cve-2024-49138-windows-clfs-heap-based-buffer-overflow-analysis/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/sources/windows-exploit-research/hunting-for-bugs-in-windows-mini-filter-drivers/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/sources/windows-exploit-research/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/sources/windows-exploit-research/introducing-windows-notification-facility-s-wnf-code-integrity/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/sources/windows-exploit-research/isolate-me-from-sandbox-explore-elevation-of-privilege-of-cng-key-isolation/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/sources/windows-exploit-research/my-blind-date-with-cve-2025-29824/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/sources/windows-exploit-research/nt-os-kernel-information-disclosure-vulnerability-cve-2025-53136/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/sources/windows-exploit-research/one-i-o-ring-to-rule-them-all-a-full-read-write-exploit-primitive-on-windows-11-/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/sources/windows-exploit-research/puzzlemaker-attacks-with-chrome-zero-day-exploit-chain/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/sources/windows-exploit-research/research-walking-through-windows-minifilter-drivers-en/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/sources/windows-exploit-research/reverse-engineering-tcpip-sys-mechanics-of-a-packet-of-the-death-cve-2021-24086/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/sources/windows-exploit-research/security-mitigation-for-the-common-log-filesystem-clfs/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/sources/windows-exploit-research/streaming-vulnerabilities-from-windows-kernel-proxying-to-kernel-part-i/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/sources/windows-exploit-research/streaming-vulnerabilities-from-windows-kernel-proxying-to-kernel-part-ii/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/sources/windows-exploit-research/understanding-the-cve-2022-37969-windows-common-log-file-system-driver-local-pri/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/sources/windows-exploit-research/windows-applocker-driver-lpe-vulnerability-cve-2024-21338/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/sources/windows-exploit-research/windows-clfs-and-five-exploits-used-by-ransomware-operators-exploit-1/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/sources/windows-exploit-research/windows-clfs-and-five-exploits-used-by-ransomware-operators-exploit-2/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/sources/windows-exploit-research/windows-clfs-and-five-exploits-used-by-ransomware-operators-exploit-3/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/sources/windows-exploit-research/windows-clfs-and-five-exploits-used-by-ransomware-operators-exploit-4/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/sources/windows-exploit-research/windows-clfs-and-five-exploits-used-by-ransomware-operators-exploit-5/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/sources/windows-exploit-research/windows-clfs-and-five-exploits-used-by-ransomware-operators/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/sources/windows-exploit-research/windows-clfs-zero-day-vulnerability-cve-2022-37969-part1/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/sources/windows-exploit-research/windows-clfs-zero-day-vulnerability-cve-2022-37969-part2/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/sources/windows-exploit-research/windows-internals-check-your-privilege-the-curious-case-of-etw-s-securitytrace-f/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/sources/windows-exploit-research/windows-internals-secure-calls-the-bridge-between-the-nt-kernel-and-secure-kerne/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/sources/windows-exploit-research/windows-kernel-exploitation-hevd-on-windows-10-22h2/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/sources/windows-exploit-research/windows-kernel-logic-bug-class-access-mode-mismatch-in-io-manager/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/sources/windows-exploit-research/wnf-chronicles-i-introduction/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/techniques/amsi-bypass/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/techniques/early-cascade-injection/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/techniques/edr-unhooking/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/techniques/heap_grooming/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/techniques/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/techniques/initial-access/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/techniques/integer_overflows/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/techniques/lateral-movement/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/techniques/persistence/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/techniques/privilege-escalation/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/techniques/race_conditions/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/techniques/recon/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/techniques/rop/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/techniques/seccomp-notify-injection/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/techniques/type_confusion/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/techniques/use_after_free/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/tools/airsnitch-cli/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/tools/airsnitch/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/tools/arpgtk/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/tools/bloodhound/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/tools/burp-suite/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/tools/burpsuite/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/tools/cobalt-strike-offsec/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/tools/cobalt-strike/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/tools/configurations/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/tools/debugging/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/tools/dynamic_analysis/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/tools/evil-clippy/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/tools/fuzzing/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/tools/ghidra/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/tools/impacket/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/tools/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/tools/metasploit/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/tools/mimikatz/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/tools/nmap-offsec/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/tools/nmap/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/tools/nuclei/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/tools/ost/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/tools/outflank-c2/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/tools/redelk/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/tools/repo-layout/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/tools/responder/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/tools/reversing/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/tools/setup-scripts/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/tools/wmic/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/usermode/browser_exploitation/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/usermode/heap_internals/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/usermode/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/usermode/mitigations/</loc>
</url>
<url>
<loc>https://gengstah.github.io/wiki/usermode/stack_exploitation/</loc>
</url>
<url>
<loc>https://gengstah.github.io/</loc>
</url>
<url>
<loc>https://gengstah.github.io/markdown/</loc>
</url>
<url>
<loc>https://gengstah.github.io/osee/</loc>
</url>
<url>
<loc>https://gengstah.github.io/page-archive/</loc>
</url>
<url>
<loc>https://gengstah.github.io/reversing/</loc>
</url>
<url>
<loc>https://gengstah.github.io/tags/</loc>
</url>
<url>
<loc>https://gengstah.github.io/vuln-research/</loc>
</url>
<url>
<loc>https://gengstah.github.io/year-archive/</loc>
</url>
<url>
<loc>https://gengstah.github.io/CLAUDE/</loc>
</url>
</urlset>
