<?xml version="1.0" encoding="UTF-8"?>
<!-- This sitemap was dynamically generated on 4 April 2026 at 04:18 by All in One SEO v4.9.5.1 - the original SEO plugin for WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://blog.modpr0.be/default-sitemap.xsl"?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>modpr0be&#039;s Blog</title>
		<link><![CDATA[https://blog.modpr0.be]]></link>
		<description><![CDATA[modpr0be&#039;s Blog]]></description>
		<lastBuildDate><![CDATA[Wed, 29 Jun 2011 10:35:47 +0000]]></lastBuildDate>
		<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
		<atom:link href="https://blog.modpr0.be/sitemap.rss" rel="self" type="application/rss+xml" />
		<ttl><![CDATA[60]]></ttl>

		<item>
			<guid><![CDATA[https://blog.modpr0.be/2011/06/29/some-documents-of-file-specifications-formats/]]></guid>
			<link><![CDATA[https://blog.modpr0.be/2011/06/29/some-documents-of-file-specifications-formats/]]></link>
			<title>Some Documents of File Specifications/Formats</title>
			<pubDate><![CDATA[Wed, 29 Jun 2011 10:35:47 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.modpr0.be/2011/09/21/scriptftp-3-3-remote-buffer-overflow-exploit-0day/]]></guid>
			<link><![CDATA[https://blog.modpr0.be/2011/09/21/scriptftp-3-3-remote-buffer-overflow-exploit-0day/]]></link>
			<title>ScriptFTP &lt;=3.3 Remote Buffer Overflow Exploit (0day)</title>
			<pubDate><![CDATA[Wed, 21 Sep 2011 14:14:12 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.modpr0.be/2011/09/14/seh-based-stack-overflow-the-basic/]]></guid>
			<link><![CDATA[https://blog.modpr0.be/2011/09/14/seh-based-stack-overflow-the-basic/]]></link>
			<title>SEH Based Stack Overflow &#8211; The Basic</title>
			<pubDate><![CDATA[Wed, 14 Sep 2011 11:32:27 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.modpr0.be/2011/09/14/msf-postgresql-problem-on-bt5/]]></guid>
			<link><![CDATA[https://blog.modpr0.be/2011/09/14/msf-postgresql-problem-on-bt5/]]></link>
			<title>MSF PostgresQL Problem on BT5</title>
			<pubDate><![CDATA[Wed, 14 Sep 2011 11:14:34 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.modpr0.be/2012/12/12/centreon-enterprise-server-2-3-3-2-3-9-4-blind-sql-injection/]]></guid>
			<link><![CDATA[https://blog.modpr0.be/2012/12/12/centreon-enterprise-server-2-3-3-2-3-9-4-blind-sql-injection/]]></link>
			<title>Centreon Enterprise Server 2.3.3 &#8211; 2.3.9-4 Blind SQL Injection</title>
			<pubDate><![CDATA[Wed, 12 Dec 2012 16:40:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.modpr0.be/2011/11/09/aviosoft-dtv-player-1-x-stack-buffer-overflow/]]></guid>
			<link><![CDATA[https://blog.modpr0.be/2011/11/09/aviosoft-dtv-player-1-x-stack-buffer-overflow/]]></link>
			<title>Aviosoft DTV Player 1.x Stack Buffer Overflow</title>
			<pubDate><![CDATA[Wed, 09 Nov 2011 15:34:53 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.modpr0.be/2012/12/05/pc-media-antivirus-insecure-library-loading-vulnerability/]]></guid>
			<link><![CDATA[https://blog.modpr0.be/2012/12/05/pc-media-antivirus-insecure-library-loading-vulnerability/]]></link>
			<title>PC Media Antivirus Insecure Library Loading Vulnerability</title>
			<pubDate><![CDATA[Wed, 05 Dec 2012 16:36:57 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.modpr0.be/2017/09/19/unicode-stack-based-buffer-overflow-on-cyberlink-labelprint-2-5/]]></guid>
			<link><![CDATA[https://blog.modpr0.be/2017/09/19/unicode-stack-based-buffer-overflow-on-cyberlink-labelprint-2-5/]]></link>
			<title>Unicode Stack-based Buffer Overflow on CyberLink LabelPrint 2.5</title>
			<pubDate><![CDATA[Tue, 19 Sep 2017 16:42:22 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.modpr0.be/kebijakan-penggunaan-blog/]]></guid>
			<link><![CDATA[https://blog.modpr0.be/kebijakan-penggunaan-blog/]]></link>
			<title>Kebijakan Penggunaan Blog</title>
			<pubDate><![CDATA[Tue, 16 Feb 2021 15:08:52 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.modpr0.be/kebijakan-privasi/]]></guid>
			<link><![CDATA[https://blog.modpr0.be/kebijakan-privasi/]]></link>
			<title>Kebijakan Privasi</title>
			<pubDate><![CDATA[Tue, 16 Feb 2021 14:13:19 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.modpr0.be/2012/09/27/trend-micro-control-manager-sql-injection-vulnerability/]]></guid>
			<link><![CDATA[https://blog.modpr0.be/2012/09/27/trend-micro-control-manager-sql-injection-vulnerability/]]></link>
			<title>Trend Micro Control Manager SQL Injection Vulnerability</title>
			<pubDate><![CDATA[Thu, 27 Sep 2012 16:12:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.modpr0.be/2011/05/12/backtrack-5-how-to-install-vmware-workstation-7-1-3/]]></guid>
			<link><![CDATA[https://blog.modpr0.be/2011/05/12/backtrack-5-how-to-install-vmware-workstation-7-1-3/]]></link>
			<title>Backtrack 5: How to install VMware Workstation 7.1.3</title>
			<pubDate><![CDATA[Thu, 12 May 2011 10:32:30 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.modpr0.be/2020/09/10/membangun-eksploitasi-windows-bagian-7-membuat-shellcode-sendiri-win32/]]></guid>
			<link><![CDATA[https://blog.modpr0.be/2020/09/10/membangun-eksploitasi-windows-bagian-7-membuat-shellcode-sendiri-win32/]]></link>
			<title>Membangun Eksploitasi Windows Bagian 7: Membuat shellcode sendiri (win32)</title>
			<pubDate><![CDATA[Thu, 10 Sep 2020 04:11:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.modpr0.be/2020/07/09/membangun-eksploitasi-windows-bagian-5-memindahkan-eksploit-ke-metasploit/]]></guid>
			<link><![CDATA[https://blog.modpr0.be/2020/07/09/membangun-eksploitasi-windows-bagian-5-memindahkan-eksploit-ke-metasploit/]]></link>
			<title>Membangun Eksploitasi Windows Bagian 5: Memindahkan eksploit ke Metasploit</title>
			<pubDate><![CDATA[Thu, 09 Jul 2020 05:12:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.modpr0.be/2011/02/03/ftpgetter-v3-58-0-21-buffer-overflow-pasv-exploit/]]></guid>
			<link><![CDATA[https://blog.modpr0.be/2011/02/03/ftpgetter-v3-58-0-21-buffer-overflow-pasv-exploit/]]></link>
			<title>FTPGetter v3.58.0.21 Buffer Overflow (PASV) Exploit</title>
			<pubDate><![CDATA[Thu, 03 Feb 2011 08:09:11 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.modpr0.be/2011/09/01/useful-addresses-when-dealing-with-rop/]]></guid>
			<link><![CDATA[https://blog.modpr0.be/2011/09/01/useful-addresses-when-dealing-with-rop/]]></link>
			<title>Useful Addresses When Dealing with ROP</title>
			<pubDate><![CDATA[Thu, 01 Sep 2011 05:04:18 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.modpr0.be/2018/10/01/zahir-enterprise-plus-6-build-10b-buffer-overflow-seh/]]></guid>
			<link><![CDATA[https://blog.modpr0.be/2018/10/01/zahir-enterprise-plus-6-build-10b-buffer-overflow-seh/]]></link>
			<title>Zahir Enterprise Plus 6 &#x3C;= build 10b &#8211; Buffer Overflow (SEH)</title>
			<pubDate><![CDATA[Sun, 30 Sep 2018 17:51:27 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.modpr0.be/lisensi-blog/]]></guid>
			<link><![CDATA[https://blog.modpr0.be/lisensi-blog/]]></link>
			<title>Lisensi Blog</title>
			<pubDate><![CDATA[Sun, 20 Feb 2022 05:12:40 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.modpr0.be/2020/08/06/membangun-eksploitasi-windows-bagian-6-membangun-eksploit-dalam-kondisi-unicode/]]></guid>
			<link><![CDATA[https://blog.modpr0.be/2020/08/06/membangun-eksploitasi-windows-bagian-6-membangun-eksploit-dalam-kondisi-unicode/]]></link>
			<title>Membangun Eksploitasi Windows Bagian 6: Membangun eksploit dalam kondisi Unicode</title>
			<pubDate><![CDATA[Sun, 14 Aug 2022 05:01:54 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.modpr0.be/2019/10/18/asus-rog-bios-reset-on-lost-battery-power/]]></guid>
			<link><![CDATA[https://blog.modpr0.be/2019/10/18/asus-rog-bios-reset-on-lost-battery-power/]]></link>
			<title>ASUS ROG BIOS Reset on Lost Battery Power</title>
			<pubDate><![CDATA[Sun, 03 Mar 2024 05:58:03 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.modpr0.be/2019/06/04/my-review-on-advanced-windows-exploitation-course-by-offensive-security/]]></guid>
			<link><![CDATA[https://blog.modpr0.be/2019/06/04/my-review-on-advanced-windows-exploitation-course-by-offensive-security/]]></link>
			<title>My Review on Advanced Windows Exploitation course by Offensive Security</title>
			<pubDate><![CDATA[Sun, 03 Mar 2024 05:49:37 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.modpr0.be/2020/07/02/membangun-eksploitasi-windows-bagian-4-menyiasati-structured-exception-handling-seh/]]></guid>
			<link><![CDATA[https://blog.modpr0.be/2020/07/02/membangun-eksploitasi-windows-bagian-4-menyiasati-structured-exception-handling-seh/]]></link>
			<title>Membangun Eksploitasi Windows Bagian 4: Menyiasati Structured Exception Handling (SEH)</title>
			<pubDate><![CDATA[Sun, 03 Mar 2024 05:28:51 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.modpr0.be/2011/05/01/remove-comments-from-configuration/]]></guid>
			<link><![CDATA[https://blog.modpr0.be/2011/05/01/remove-comments-from-configuration/]]></link>
			<title>Remove Comments from Configuration</title>
			<pubDate><![CDATA[Sun, 01 May 2011 08:14:02 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.modpr0.be/2020/06/20/membangun-eksploitasi-windows-bagian-2-fuzzing/]]></guid>
			<link><![CDATA[https://blog.modpr0.be/2020/06/20/membangun-eksploitasi-windows-bagian-2-fuzzing/]]></link>
			<title>Membangun Eksploitasi Windows Bagian 2: Fuzzing</title>
			<pubDate><![CDATA[Sat, 20 Jun 2020 04:11:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.modpr0.be/2020/06/27/membangun-eksploitasi-windows-bagian-3-stack-based-overflow/]]></guid>
			<link><![CDATA[https://blog.modpr0.be/2020/06/27/membangun-eksploitasi-windows-bagian-3-stack-based-overflow/]]></link>
			<title>Membangun Eksploitasi Windows Bagian 3: Stack-based Overflow</title>
			<pubDate><![CDATA[Sat, 19 Feb 2022 15:15:59 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.modpr0.be/2011/10/07/blazevideo-hdtv-player-6-x-buffer-overflow-another-version/]]></guid>
			<link><![CDATA[https://blog.modpr0.be/2011/10/07/blazevideo-hdtv-player-6-x-buffer-overflow-another-version/]]></link>
			<title>BlazeVideo HDTV Player 6.x Buffer Overflow (another version)</title>
			<pubDate><![CDATA[Sat, 19 Feb 2022 15:01:07 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.modpr0.be/blog/]]></guid>
			<link><![CDATA[https://blog.modpr0.be/blog/]]></link>
			<title>Blog</title>
			<pubDate><![CDATA[Sat, 17 Jul 2021 04:10:25 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.modpr0.be/2012/04/14/cyberlink-power2go-unicode-stack-buffer-overflow/]]></guid>
			<link><![CDATA[https://blog.modpr0.be/2012/04/14/cyberlink-power2go-unicode-stack-buffer-overflow/]]></link>
			<title>CyberLink Power2Go Unicode Stack Buffer Overflow</title>
			<pubDate><![CDATA[Sat, 14 Apr 2012 15:53:20 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.modpr0.be/2020/06/13/membangun-eksploitasi-windows-bagian-1-perkenalan-dengan-buffer-overflow-di-windows/]]></guid>
			<link><![CDATA[https://blog.modpr0.be/2020/06/13/membangun-eksploitasi-windows-bagian-1-perkenalan-dengan-buffer-overflow-di-windows/]]></link>
			<title>Membangun Eksploitasi Windows Bagian 1: Perkenalan dengan  buffer overflow di Windows</title>
			<pubDate><![CDATA[Sat, 13 Jun 2020 04:11:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.modpr0.be/kontak/]]></guid>
			<link><![CDATA[https://blog.modpr0.be/kontak/]]></link>
			<title>Hubungi Saya</title>
			<pubDate><![CDATA[Sat, 12 Feb 2022 11:01:25 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.modpr0.be/2011/09/10/mel0nplayer-1-0-11-x-denial-of-service-poc/]]></guid>
			<link><![CDATA[https://blog.modpr0.be/2011/09/10/mel0nplayer-1-0-11-x-denial-of-service-poc/]]></link>
			<title>Mel0nPlayer 1.0.11.x Denial of Service POC</title>
			<pubDate><![CDATA[Sat, 10 Sep 2011 10:47:19 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.modpr0.be/home/]]></guid>
			<link><![CDATA[https://blog.modpr0.be/home/]]></link>
			<title>Home</title>
			<pubDate><![CDATA[Sat, 10 Nov 2018 13:02:37 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.modpr0.be/2012/06/02/hexamail-server-4-4-5-persistent-xss-vulnerability/]]></guid>
			<link><![CDATA[https://blog.modpr0.be/2012/06/02/hexamail-server-4-4-5-persistent-xss-vulnerability/]]></link>
			<title>Hexamail Server &#x3C;= 4.4.5 Persistent XSS Vulnerability</title>
			<pubDate><![CDATA[Sat, 02 Jun 2012 15:57:31 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.modpr0.be/2011/09/26/191/]]></guid>
			<link><![CDATA[https://blog.modpr0.be/2011/09/26/191/]]></link>
			<title>Porting Your Exploit to Metasploit</title>
			<pubDate><![CDATA[Mon, 26 Sep 2011 14:46:56 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.modpr0.be/2012/03/19/directory-traversal-with-dotdotpwn-https-mode/]]></guid>
			<link><![CDATA[https://blog.modpr0.be/2012/03/19/directory-traversal-with-dotdotpwn-https-mode/]]></link>
			<title>Directory Traversal with DotDotPwn (HTTPS Mode)</title>
			<pubDate><![CDATA[Mon, 19 Mar 2012 15:43:11 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.modpr0.be/2012/06/18/ezhometech-ezserver-6-4-017-stack-buffer-overflow-vulnerability/]]></guid>
			<link><![CDATA[https://blog.modpr0.be/2012/06/18/ezhometech-ezserver-6-4-017-stack-buffer-overflow-vulnerability/]]></link>
			<title>Ezhometech Ezserver &#x3C;=6.4.017 Stack Buffer Overflow Vulnerability</title>
			<pubDate><![CDATA[Mon, 18 Jun 2012 16:00:45 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.modpr0.be/2012/09/17/weberp-4-08-4-sql-injection-vulnerability/]]></guid>
			<link><![CDATA[https://blog.modpr0.be/2012/09/17/weberp-4-08-4-sql-injection-vulnerability/]]></link>
			<title>webERP &#x3C;=4.08.4 SQL Injection Vulnerability</title>
			<pubDate><![CDATA[Mon, 17 Sep 2012 16:07:59 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.modpr0.be/2011/09/12/silent-backdoor-with-weevely/]]></guid>
			<link><![CDATA[https://blog.modpr0.be/2011/09/12/silent-backdoor-with-weevely/]]></link>
			<title>Silent Backdoor with Weevely</title>
			<pubDate><![CDATA[Mon, 12 Sep 2011 10:50:15 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.modpr0.be/2021/01/11/membangun-eksploitasi-windows-bagian-8-win32-egghunter/]]></guid>
			<link><![CDATA[https://blog.modpr0.be/2021/01/11/membangun-eksploitasi-windows-bagian-8-win32-egghunter/]]></link>
			<title>Membangun Eksploitasi Windows Bagian 8: win32 Egghunter</title>
			<pubDate><![CDATA[Mon, 11 Jan 2021 05:30:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.modpr0.be/2019/09/09/cdef-podcast-head-to-head-bug-bounty-vs-pentesting/]]></guid>
			<link><![CDATA[https://blog.modpr0.be/2019/09/09/cdef-podcast-head-to-head-bug-bounty-vs-pentesting/]]></link>
			<title>CDEF Podcast: Head to Head Bug Bounty vs Pentesting</title>
			<pubDate><![CDATA[Mon, 09 Sep 2019 16:58:57 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.modpr0.be/2011/05/09/dump-windows-system-info/]]></guid>
			<link><![CDATA[https://blog.modpr0.be/2011/05/09/dump-windows-system-info/]]></link>
			<title>Dump Windows System Info</title>
			<pubDate><![CDATA[Mon, 09 May 2011 08:16:25 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.modpr0.be/2012/04/09/distinct-tftp-server-3-10-directory-traversal-vulnerability/]]></guid>
			<link><![CDATA[https://blog.modpr0.be/2012/04/09/distinct-tftp-server-3-10-directory-traversal-vulnerability/]]></link>
			<title>Distinct TFTP Server &#x3C;=3.10 Directory Traversal Vulnerability</title>
			<pubDate><![CDATA[Mon, 09 Apr 2012 15:46:01 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.modpr0.be/2011/07/04/metasploit-meterpreter-command-shell-upgrade/]]></guid>
			<link><![CDATA[https://blog.modpr0.be/2011/07/04/metasploit-meterpreter-command-shell-upgrade/]]></link>
			<title>Metasploit Meterpreter Command Shell Upgrade</title>
			<pubDate><![CDATA[Mon, 04 Jul 2011 10:38:38 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.modpr0.be/2011/10/03/scriptftp-3-3-remote-buffer-overflow-exploit-msf/]]></guid>
			<link><![CDATA[https://blog.modpr0.be/2011/10/03/scriptftp-3-3-remote-buffer-overflow-exploit-msf/]]></link>
			<title>ScriptFTP &#x3C;=3.3 Remote Buffer Overflow Exploit (MSF)</title>
			<pubDate><![CDATA[Mon, 03 Oct 2011 15:40:43 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.modpr0.be/2017/09/29/blind-sql-injection-vulnerability-in-filerun-2017-09-18/]]></guid>
			<link><![CDATA[https://blog.modpr0.be/2017/09/29/blind-sql-injection-vulnerability-in-filerun-2017-09-18/]]></link>
			<title>Blind SQL Injection Vulnerability in FileRun &#x3C;=2017.09.18</title>
			<pubDate><![CDATA[Fri, 29 Sep 2017 16:53:17 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.modpr0.be/2010/12/17/solarftp-2-0-multiple-commands-denial-of-service-vulnerability/]]></guid>
			<link><![CDATA[https://blog.modpr0.be/2010/12/17/solarftp-2-0-multiple-commands-denial-of-service-vulnerability/]]></link>
			<title>SolarFTP 2.0 Multiple Commands Denial of Service Vulnerability</title>
			<pubDate><![CDATA[Fri, 17 Dec 2010 06:48:46 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.modpr0.be/2012/08/17/proxychains-on-osx-mountain-lion/]]></guid>
			<link><![CDATA[https://blog.modpr0.be/2012/08/17/proxychains-on-osx-mountain-lion/]]></link>
			<title>Proxychains on OSX Mountain Lion</title>
			<pubDate><![CDATA[Fri, 17 Aug 2012 04:15:56 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.modpr0.be/2012/09/14/trend-micro-interscan-messaging-security-suite-multiple-vulnerabilities/]]></guid>
			<link><![CDATA[https://blog.modpr0.be/2012/09/14/trend-micro-interscan-messaging-security-suite-multiple-vulnerabilities/]]></link>
			<title>Trend Micro InterScan Messaging Security Suite Multiple Vulnerabilities</title>
			<pubDate><![CDATA[Fri, 14 Sep 2012 16:05:09 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.modpr0.be/2019/09/06/google-calendar-spam/]]></guid>
			<link><![CDATA[https://blog.modpr0.be/2019/09/06/google-calendar-spam/]]></link>
			<title>Google Calendar Spam</title>
			<pubDate><![CDATA[Fri, 06 Sep 2019 04:17:40 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://blog.modpr0.be/2011/02/04/quickshare-file-server-1-2-1-ftp-directory-traversal-vulnerability/]]></guid>
			<link><![CDATA[https://blog.modpr0.be/2011/02/04/quickshare-file-server-1-2-1-ftp-directory-traversal-vulnerability/]]></link>
			<title>QuickShare File Server 1.2.1 FTP Directory Traversal Vulnerability</title>
			<pubDate><![CDATA[Fri, 04 Feb 2011 08:11:31 +0000]]></pubDate>
		</item>
				</channel>
</rss>
