https://www.gnucitizen.org2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/0day-hacking-secured-citrix-from-outside/2007-10-10T15:40:34.000Zdaily1.0https://www.gnucitizen.org/blog/0day-hacking-secured-citrix-from-outside/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/0day-pdf-pwns-windows/2007-09-20T13:03:33.000Zdaily1.0https://www.gnucitizen.org/blog/0day-pdf-pwns-windows/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/0day-quicktime-pwns-firefox/2007-09-12T12:05:53.000Zdaily1.0https://www.gnucitizen.org/blog/0day-quicktime-pwns-firefox/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/1st-european-edition-of-hitb-coming-up/2010-06-24T09:16:22.000Zdaily1.0https://www.gnucitizen.org/blog/30mins-introductionary-presentation-on-client-side-security/2008-02-17T11:07:31.000Zdaily1.0https://www.gnucitizen.org/blog/30mins-introductionary-presentation-on-client-side-security/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/6000-members-on-hoh/2008-11-24T10:56:37.000Zdaily1.0https://www.gnucitizen.org/blog/6th-owasp-conference/2007-05-17T07:33:14.000Zdaily1.0https://www.gnucitizen.org/blog/6th-owasp-conference/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/a-bag-full-of-tricks/2006-10-19T03:26:10.000Zdaily1.0https://www.gnucitizen.org/blog/a-brief-history-of-myspace/2007-06-22T21:23:17.000Zdaily1.0https://www.gnucitizen.org/blog/a-brief-history-of-myspace/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/a-must-read-brief-testimony-of-our-disclosure-experience/2007-12-23T11:15:16.000Zdaily1.0https://www.gnucitizen.org/blog/a-must-read-brief-testimony-of-our-disclosure-experience/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/about-the-power-of-google/2007-06-23T10:31:50.000Zdaily1.0https://www.gnucitizen.org/blog/about-the-power-of-google/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/ad-jacking-xssing-for-fun-and-profit/2007-07-01T08:24:28.000Zdaily1.0https://www.gnucitizen.org/blog/ad-jacking-xssing-for-fun-and-profit/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/agile-hacking/2008-03-17T18:57:40.000Zdaily1.0https://www.gnucitizen.org/blog/agile-hacking/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/agile-hacking-a-homegrown-telnet-based-portscanner/2008-05-11T06:21:29.000Zdaily1.0https://www.gnucitizen.org/blog/agile-hacking-a-homegrown-telnet-based-portscanner/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/airport-kiosks-security/2007-11-24T22:05:39.000Zdaily1.0https://www.gnucitizen.org/blog/airport-kiosks-security/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/all-your-metadata-are-belong-to-us/2008-01-04T08:15:22.000Zdaily1.0https://www.gnucitizen.org/blog/all-your-metadata-are-belong-to-us/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/application-layer-anti-virusfirewall/2007-04-11T09:05:44.000Zdaily1.0https://www.gnucitizen.org/blog/application-layer-anti-virusfirewall/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/asx-plus-clickonce-dangerous-combination/2007-11-05T12:52:02.000Zdaily1.0https://www.gnucitizen.org/blog/asx-plus-clickonce-dangerous-combination/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/atom-2/2007-01-20T10:12:19.000Zdaily1.0https://www.gnucitizen.org/blog/atom-2/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/attack-of-the-url-vulnerabilities/2007-07-25T09:51:28.000Zdaily1.0https://www.gnucitizen.org/blog/attack-of-the-url-vulnerabilities/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/attackapi/2006-08-26T02:00:47.000Zdaily1.0https://www.gnucitizen.org/blog/attackapi/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/attackapi-08-is-out/2006-10-16T04:39:05.000Zdaily1.0https://www.gnucitizen.org/blog/attackapi-08-is-out/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/attacking-password-recovery-facilities/2007-07-06T08:54:44.000Zdaily1.0https://www.gnucitizen.org/blog/attacking-password-recovery-facilities/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/audio-from-black-hat-usa-2008/2008-09-17T09:50:16.000Zdaily1.0https://www.gnucitizen.org/blog/audio-from-black-hat-usa-2008/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/author-of-the-xss-book/2007-02-16T23:19:40.000Zdaily1.0https://www.gnucitizen.org/blog/author-of-the-xss-book/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/automated-web-foo-or-fud/2007-08-03T22:00:04.000Zdaily1.0https://www.gnucitizen.org/blog/automated-web-foo-or-fud/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/automated-xss-detection/2006-11-06T01:42:47.000Zdaily1.0https://www.gnucitizen.org/blog/automated-xss-detection/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/back-from-the-cons/2008-11-10T10:05:21.000Zdaily1.0https://www.gnucitizen.org/blog/back-from-the-cons/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/backdooring-flash-objects/2006-09-04T19:07:37.000Zdaily1.0https://www.gnucitizen.org/blog/backdooring-flash-objects/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/backdooring-flash-objects-receipt/2006-09-05T22:03:52.000Zdaily1.0https://www.gnucitizen.org/blog/backdooring-flash-objects-receipt/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/backdooring-images/2006-12-15T04:57:22.000Zdaily1.0https://www.gnucitizen.org/blog/backdooring-images/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/backdooring-mp3-files/2006-09-20T21:39:18.000Zdaily1.0https://www.gnucitizen.org/blog/backdooring-mp3-files/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/backdooring-quicktime-movies/2006-09-05T22:51:33.000Zdaily1.0https://www.gnucitizen.org/blog/backdooring-quicktime-movies/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/backdooring-web-pages/2006-08-28T11:09:08.000Zdaily1.0https://www.gnucitizen.org/blog/backdooring-web-pages/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/backdooring-windows-media-files/2007-09-18T12:51:31.000Zdaily1.0https://www.gnucitizen.org/blog/backdooring-windows-media-files/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/backframe/2006-10-30T03:02:44.000Zdaily1.0https://www.gnucitizen.org/blog/backframe/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/backframe-2x-sneak-preview/2006-12-13T08:42:08.000Zdaily1.0https://www.gnucitizen.org/blog/bbh-scale/2019-07-09T16:38:00.000Zdaily1.0https://www.gnucitizen.org/blog/bid-24856-flash-player-swf-vulnerability/2007-07-23T10:06:29.000Zdaily1.0https://www.gnucitizen.org/blog/bid-24856-flash-player-swf-vulnerability/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/big-fish/2007-04-03T13:01:10.000Zdaily1.0https://www.gnucitizen.org/blog/big-fish/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/black-hat-europe-2008/2008-04-22T15:11:48.000Zdaily1.0https://www.gnucitizen.org/blog/black-hat-europe-2008/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/black-hat-europe-2008-amsterdam/2008-03-25T16:17:51.000Zdaily1.0https://www.gnucitizen.org/blog/black-hat-europe-2008-amsterdam/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/black-hat-las-vegas-baby/2008-07-30T13:49:53.000Zdaily1.0https://www.gnucitizen.org/blog/black-hat-las-vegas-baby/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/breaking-into-a-home-with-an-iphone/2009-05-11T11:27:16.000Zdaily1.0https://www.gnucitizen.org/blog/breaking-into-a-home-with-an-iphone/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/bring-back-the-attack-to-the-api/2008-11-24T11:56:23.000Zdaily1.0https://www.gnucitizen.org/blog/bring-back-the-attack-to-the-api/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/browser-focus-rip/2007-02-12T23:59:32.000Zdaily1.0https://www.gnucitizen.org/blog/browser-focus-rip/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/browser-rootkits/2007-10-16T10:41:12.000Zdaily1.0https://www.gnucitizen.org/blog/browser-rootkits/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/bt-home-flub-pwnin-the-bt-home-hub/2007-10-08T16:41:42.000Zdaily1.0https://www.gnucitizen.org/blog/bt-home-flub-pwnin-the-bt-home-hub/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/bt-home-flub-pwnin-the-bt-home-hub-2/2007-10-16T22:02:03.000Zdaily1.0https://www.gnucitizen.org/blog/bt-home-flub-pwnin-the-bt-home-hub-2/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/bt-home-flub-pwnin-the-bt-home-hub-3/2007-10-23T10:39:35.000Zdaily1.0https://www.gnucitizen.org/blog/bt-home-flub-pwnin-the-bt-home-hub-3/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/bt-home-flub-pwnin-the-bt-home-hub-4/2007-11-08T11:33:13.000Zdaily1.0https://www.gnucitizen.org/blog/bt-home-flub-pwnin-the-bt-home-hub-4/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/bt-home-flub-pwnin-the-bt-home-hub-5/2008-01-10T11:46:14.000Zdaily1.0https://www.gnucitizen.org/blog/bt-home-flub-pwnin-the-bt-home-hub-5/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/bug-bounty-tips/2019-07-07T19:01:00.000Zdaily1.0https://www.gnucitizen.org/blog/bugs-in-the-browser-firefoxs-data-url-scheme-vulnerability/2007-11-01T01:39:19.000Zdaily1.0https://www.gnucitizen.org/blog/bugs-in-the-browser-firefoxs-data-url-scheme-vulnerability/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/bulletproof-rich-content-filters/2007-12-18T11:13:28.000Zdaily1.0https://www.gnucitizen.org/blog/bulletproof-rich-content-filters/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/call-jacking-phreaking-the-bt-home-hub/2008-01-21T02:46:53.000Zdaily1.0https://www.gnucitizen.org/blog/call-jacking-phreaking-the-bt-home-hub/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/changes-in-the-british-computer-misuse-act/2007-04-27T09:40:57.000Zdaily1.0https://www.gnucitizen.org/blog/changes-in-the-british-computer-misuse-act/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/citrix-owning-the-legitimate-backdoor/2007-10-04T16:26:51.000Zdaily1.0https://www.gnucitizen.org/blog/citrix-owning-the-legitimate-backdoor/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/clear/2007-10-13T12:38:55.000Zdaily1.0https://www.gnucitizen.org/blog/clear/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/client-side-security/2007-06-11T17:11:36.000Zdaily1.0https://www.gnucitizen.org/blog/client-side-security/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/client-side-sql-injection-attacks/2007-06-05T21:33:36.000Zdaily1.0https://www.gnucitizen.org/blog/client-side-sql-injection-attacks/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/clouds-and-the-distorted-notion-of-direct-control/2008-08-27T09:38:20.000Zdaily1.0https://www.gnucitizen.org/blog/co-authoring-google-hacking-for-penetration-testers-volume-2/2007-07-04T08:44:42.000Zdaily1.0https://www.gnucitizen.org/blog/co-authoring-google-hacking-for-penetration-testers-volume-2/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/codez-are-up/2009-03-11T14:18:54.000Zdaily1.0https://www.gnucitizen.org/blog/codez-are-up/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/coldfusion-directory-traversal-faq-cve-2010-2861/2010-08-13T15:31:33.000Zdaily1.0https://www.gnucitizen.org/blog/coldfusion-directory-traversal-faq-cve-2010-2861/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/compliance/2008-10-09T12:51:30.000Zdaily1.0https://www.gnucitizen.org/blog/compliance/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/confidence-2008/2008-05-20T09:03:33.000Zdaily1.0https://www.gnucitizen.org/blog/confidence-2008/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/confidence-2009-coming-up-soon/2009-03-14T13:47:47.000Zdaily1.0https://www.gnucitizen.org/blog/confidence-2009-coming-up-soon/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/congratulation-youve-been-nominated-for-a-pwnie-award/2007-08-01T08:36:05.000Zdaily1.0https://www.gnucitizen.org/blog/congratulation-youve-been-nominated-for-a-pwnie-award/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/conspiracy/2008-05-07T23:14:47.000Zdaily1.0https://www.gnucitizen.org/blog/constructive-chaos/2007-08-07T22:09:52.000Zdaily1.0https://www.gnucitizen.org/blog/content-disposition-hacking/2007-11-05T12:44:31.000Zdaily1.0https://www.gnucitizen.org/blog/content-disposition-hacking/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/content-injection-hack-the-hacker/2008-04-11T13:52:19.000Zdaily1.0https://www.gnucitizen.org/blog/content-injection-hack-the-hacker/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/cross-context-scripting-with-sage/2006-09-08T16:39:36.000Zdaily1.0https://www.gnucitizen.org/blog/cross-context-scripting-with-sage/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/cross-site-file-upload-attacks/2008-02-21T12:15:32.000Zdaily1.0https://www.gnucitizen.org/blog/cross-site-file-upload-attacks/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/cross-site-request-forgery/2006-12-04T07:32:39.000Zdaily1.0https://www.gnucitizen.org/blog/cross-site-request-forgery/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/csrf-demystified/2007-11-21T10:22:34.000Zdaily1.0https://www.gnucitizen.org/blog/csrf-demystified/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/csrf-ing-blogger-classic/2007-01-19T10:02:10.000Zdaily1.0https://www.gnucitizen.org/blog/csrf-ing-blogger-classic/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/cve-2009-1151-phpmyadmin-remote-code-execution-proof-of-concept/2009-06-09T19:03:13.000Zdaily1.0https://www.gnucitizen.org/blog/cve-2009-1151-phpmyadmin-remote-code-execution-proof-of-concept/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/danger-danger-danger/2007-01-03T01:10:32.000Zdaily1.0https://www.gnucitizen.org/blog/danger-danger-danger/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/darknets/2008-04-04T08:44:00.000Zdaily1.0https://www.gnucitizen.org/blog/darknets/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/deep-inspection-of-online-personas/2009-01-29T18:17:49.000Zdaily1.0https://www.gnucitizen.org/blog/deep-inspection-of-online-personas/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/default-key-algorithm-in-thomson-and-bt-home-hub-routers/2008-04-14T08:00:33.000Zdaily1.0https://www.gnucitizen.org/blog/default-key-algorithm-in-thomson-and-bt-home-hub-routers/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/details-of-the-quicktime-vulnerability/2008-09-09T14:24:38.000Zdaily1.0https://www.gnucitizen.org/blog/details-of-the-quicktime-vulnerability/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/dhcpmdns-injection-issues/2008-01-27T09:30:07.000Zdaily1.0https://www.gnucitizen.org/blog/dnsmap-v030-is-now-out/2010-02-20T21:08:48.000Zdaily1.0https://www.gnucitizen.org/blog/dnsmap-v030-is-now-out/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/do-we-really-need-a-security-industry/2007-05-04T09:20:40.000Zdaily1.0https://www.gnucitizen.org/blog/do-we-really-need-a-security-industry/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/does-what-happens-in-the-facebook-stay-in-the-facebook/2007-06-22T14:15:43.000Zdaily1.0https://www.gnucitizen.org/blog/does-what-happens-in-the-facebook-stay-in-the-facebook/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/dumping-the-admin-password-of-the-bt-home-hub/2008-05-21T09:27:21.000Zdaily1.0https://www.gnucitizen.org/blog/dumping-the-admin-password-of-the-bt-home-hub/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/dumping-the-admin-password-of-the-bt-home-hub-pt-2/2008-05-27T09:11:51.000Zdaily1.0https://www.gnucitizen.org/blog/dumping-the-admin-password-of-the-bt-home-hub-pt-2/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/even-more-advanced-clickjacking/2008-11-27T17:18:27.000Zdaily1.0https://www.gnucitizen.org/blog/even-more-advanced-clickjacking/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/even-more-xss-worms/2009-04-12T08:29:41.000Zdaily1.0https://www.gnucitizen.org/blog/even-more-xss-worms/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/exegesis-of-virtual-hosts-hacking/2006-04-06T22:45:00.000Zdaily1.0https://www.gnucitizen.org/blog/exploit-development-framework-design/2009-04-16T09:40:15.000Zdaily1.0https://www.gnucitizen.org/blog/exploit-development-framework-design/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/exploit-sweatshop/2009-04-30T12:04:47.000Zdaily1.0https://www.gnucitizen.org/blog/exploit-sweatshop/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/exploiting-the-iphone/2007-07-23T09:00:28.000Zdaily1.0https://www.gnucitizen.org/blog/exploring-the-unknown-scanning-the-internet-via-snmp/2008-03-03T16:51:32.000Zdaily1.0https://www.gnucitizen.org/blog/exploring-the-unknown-scanning-the-internet-via-snmp/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/extensions-at-war/2009-05-03T08:37:28.000Zdaily1.0https://www.gnucitizen.org/blog/extensions-at-war/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/extreme-search-engine-hacking/2008-02-22T11:45:12.000Zdaily1.0https://www.gnucitizen.org/blog/extreme-search-engine-hacking/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/facebook-homepage-source-code-probably-leaked/2007-08-12T08:13:28.000Zdaily1.0https://www.gnucitizen.org/blog/facebook-homepage-source-code-probably-leaked/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/facebook-worms-and-rss-feeds-hacking-the-web20-way-and-beyond/2008-10-29T09:36:34.000Zdaily1.0https://www.gnucitizen.org/blog/facebook-worms-and-rss-feeds-hacking-the-web20-way-and-beyond/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/fear/2008-06-20T08:43:22.000Zdaily1.0https://www.gnucitizen.org/blog/fear/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/fex-enables-firefox-extension-scanner/2006-08-25T09:35:18.000Zdaily1.0https://www.gnucitizen.org/blog/firebug-goes-evil/2007-04-04T19:12:38.000Zdaily1.0https://www.gnucitizen.org/blog/firebug-goes-evil/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/firefox-could-also-be-used-as-the-entry-point/2007-07-24T08:11:45.000Zdaily1.0https://www.gnucitizen.org/blog/firefox-could-also-be-used-as-the-entry-point/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/firefox-malware/2008-12-08T19:48:37.000Zdaily1.0https://www.gnucitizen.org/blog/firefox-malware/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/flash-cookie-object-tracking/2007-12-06T14:44:26.000Zdaily1.0https://www.gnucitizen.org/blog/flash-cookie-object-tracking/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/flash-upnp-attack-faq/2008-01-14T20:20:02.000Zdaily1.0https://www.gnucitizen.org/blog/flash-upnp-attack-faq/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/for-my-next-trick-hacking-web20/2007-08-31T23:01:06.000Zdaily1.0https://www.gnucitizen.org/blog/for-my-next-trick-hacking-web20/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/frame-injection-fun/2008-10-10T00:01:28.000Zdaily1.0https://www.gnucitizen.org/blog/frame-injection-fun/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/free-web-application-security-testing-tool/2009-08-07T08:02:38.000Zdaily1.0https://www.gnucitizen.org/blog/free-web-application-security-testing-tool/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/friendly-ajax-xss-worm-for-wordpress/2007-07-31T22:30:04.000Zdaily1.0https://www.gnucitizen.org/blog/friendly-ajax-xss-worm-for-wordpress/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/full-disclosure/2007-07-29T08:50:57.000Zdaily1.0https://www.gnucitizen.org/blog/full-disclosure/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/fuzzing-xml-and-json-pt-1/2012-12-13T11:47:35.000Zdaily1.0https://www.gnucitizen.org/blog/general-purpose-fuzzer_py/2007-12-17T00:15:42.000Zdaily1.0https://www.gnucitizen.org/blog/general-purpose-fuzzer_py/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/geo-tracking-mobile-phones/2007-10-18T11:11:47.000Zdaily1.0https://www.gnucitizen.org/blog/geo-tracking-mobile-phones/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/geo-tracking-online-personas/2007-11-30T14:37:45.000Zdaily1.0https://www.gnucitizen.org/blog/geo-tracking-online-personas/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/ghdb/2007-05-21T13:24:45.000Zdaily1.0https://www.gnucitizen.org/blog/ghdb/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/ghost-busters/2008-05-15T16:26:48.000Zdaily1.0https://www.gnucitizen.org/blog/ghost-busters/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/gifars-and-other-issues/2008-08-03T15:20:11.000Zdaily1.0https://www.gnucitizen.org/blog/gifars-and-other-issues/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/gmail-security-flaw/2008-11-24T13:03:50.000Zdaily1.0https://www.gnucitizen.org/blog/gmail-security-flaw/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/gnucitizen-in-2005/2008-11-24T11:09:18.000Zdaily1.0https://www.gnucitizen.org/blog/gnucitizen-in-2005/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/gnucitizen-on-pauldotcom/2008-03-14T14:37:39.000Zdaily1.0https://www.gnucitizen.org/blog/gnucitizen-on-pauldotcom/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/google_js/2007-10-06T11:39:00.000Zdaily1.0https://www.gnucitizen.org/blog/google_js/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/google_py/2007-12-22T08:29:35.000Zdaily1.0https://www.gnucitizen.org/blog/google_py/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/google-and-wildcard-domains/2008-06-23T09:38:59.000Zdaily1.0https://www.gnucitizen.org/blog/google-and-wildcard-domains/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/google-chrome/2008-09-02T10:51:20.000Zdaily1.0https://www.gnucitizen.org/blog/google-chrome/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/google-gmail-e-mail-hijack-technique/2007-09-25T18:50:33.000Zdaily1.0https://www.gnucitizen.org/blog/google-gmail-e-mail-hijack-technique/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/google-hacking-for-penetration-testers-second-edition/2008-01-03T14:26:20.000Zdaily1.0https://www.gnucitizen.org/blog/google-hacking-for-penetration-testers-second-edition/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/google-search-api-worms/2006-09-14T10:17:52.000Zdaily1.0https://www.gnucitizen.org/blog/google-search-api-worms/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/google-search-api-worms-2/2006-10-04T02:11:42.000Zdaily1.0https://www.gnucitizen.org/blog/google-search-api-worms-2/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/google-search-api-worms-3/2006-10-05T02:05:51.000Zdaily1.0https://www.gnucitizen.org/blog/google-search-results-poisoning/2007-01-16T09:31:13.000Zdaily1.0https://www.gnucitizen.org/blog/google-search-results-poisoning/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/google-urchin-password-theft-madness/2007-09-24T14:14:49.000Zdaily1.0https://www.gnucitizen.org/blog/google-urchin-password-theft-madness/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/hacking-citrix-the-forceful-way/2007-10-05T15:39:03.000Zdaily1.0https://www.gnucitizen.org/blog/hacking-citrix-the-forceful-way/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/hacking-linksys-ip-cameras-pt-1/2009-04-20T07:40:35.000Zdaily1.0https://www.gnucitizen.org/blog/hacking-linksys-ip-cameras-pt-1/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/hacking-linksys-ip-cameras-pt-2/2009-04-20T22:27:14.000Zdaily1.0https://www.gnucitizen.org/blog/hacking-linksys-ip-cameras-pt-2/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/hacking-linksys-ip-cameras-pt-3/2009-04-23T00:52:28.000Zdaily1.0https://www.gnucitizen.org/blog/hacking-linksys-ip-cameras-pt-3/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/hacking-linksys-ip-cameras-pt-4/2009-04-25T03:28:38.000Zdaily1.0https://www.gnucitizen.org/blog/hacking-linksys-ip-cameras-pt-4/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/hacking-linksys-ip-cameras-pt-5/2009-06-05T08:04:55.000Zdaily1.0https://www.gnucitizen.org/blog/hacking-linksys-ip-cameras-pt-5/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/hacking-linksys-ip-cameras-pt-6/2010-02-24T07:18:29.000Zdaily1.0https://www.gnucitizen.org/blog/hacking-linksys-ip-cameras-pt-6/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/hacking-the-interwebs/2008-01-12T12:57:22.000Zdaily1.0https://www.gnucitizen.org/blog/hacking-the-interwebs/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/hacking-video-surveillance-networks/2008-01-30T11:05:48.000Zdaily1.0https://www.gnucitizen.org/blog/hacking-video-surveillance-networks/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/hacking-with-ml/2021-04-26T15:10:45.000Zdaily1.0https://www.gnucitizen.org/blog/hacking-with-upnp-universal-plug-and-play/2008-01-10T11:45:44.000Zdaily1.0https://www.gnucitizen.org/blog/hacking-with-upnp-universal-plug-and-play/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/hacking-without-0days-drive-by-java/2007-10-25T16:13:36.000Zdaily1.0https://www.gnucitizen.org/blog/hacking-without-0days-drive-by-java/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/hamster-plus-hotspot-equals-web-20-meltdown-not/2007-08-15T09:28:40.000Zdaily1.0https://www.gnucitizen.org/blog/hamster-plus-hotspot-equals-web-20-meltdown-not/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/happy-new-2009/2009-01-01T11:15:58.000Zdaily1.0https://www.gnucitizen.org/blog/happy-new-2009/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/harder-better-faster-stronger-the-malware/2008-11-22T18:48:59.000Zdaily1.0https://www.gnucitizen.org/blog/harder-better-faster-stronger-the-malware/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/having-fun-with-beef-the-browser-exploitation-framework/2011-02-22T11:40:26.000Zdaily1.0https://www.gnucitizen.org/blog/having-fun-with-beef-the-browser-exploitation-framework/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/hidden/2008-04-08T08:56:27.000Zdaily1.0https://www.gnucitizen.org/blog/hidden/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/hijacking-innocent-frames/2008-12-11T21:39:16.000Zdaily1.0https://www.gnucitizen.org/blog/hijacking-innocent-frames/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/hijacking-openid-enabled-accounts/2008-02-03T16:08:49.000Zdaily1.0https://www.gnucitizen.org/blog/hijacking-openid-enabled-accounts/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/hitb-dubai-2008/2008-04-24T14:23:38.000Zdaily1.0https://www.gnucitizen.org/blog/hitb-dubai-2008/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/hitb-dubai-2008-we-cant-wait/2008-03-03T12:40:24.000Zdaily1.0https://www.gnucitizen.org/blog/hitb-dubai-2008-we-cant-wait/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/hoh-5001-members-and-growing/2008-08-01T09:03:32.000Zdaily1.0https://www.gnucitizen.org/blog/hoh-5001-members-and-growing/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/holes-in-embedded-devices-authentication-bypass-pt-1/2008-02-14T12:13:33.000Zdaily1.0https://www.gnucitizen.org/blog/holes-in-embedded-devices-authentication-bypass-pt-1/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/holes-in-embedded-devices-authentication-bypass-pt-2/2008-02-15T17:18:09.000Zdaily1.0https://www.gnucitizen.org/blog/holes-in-embedded-devices-authentication-bypass-pt-3/2008-02-16T08:08:17.000Zdaily1.0https://www.gnucitizen.org/blog/holes-in-embedded-devices-authentication-bypass-pt-3/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/holes-in-embedded-devices-authentication-bypass-pt-4/2008-02-26T16:37:36.000Zdaily1.0https://www.gnucitizen.org/blog/holes-in-embedded-devices-authentication-bypass-pt-4/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/holes-in-embedded-devices-binary-state-session-management/2008-01-29T09:52:22.000Zdaily1.0https://www.gnucitizen.org/blog/holes-in-embedded-devices-desynchronized-service-acting-as-backdoor/2008-02-06T11:04:08.000Zdaily1.0https://www.gnucitizen.org/blog/holes-in-embedded-devices-desynchronized-service-acting-as-backdoor/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/holes-in-embedded-devices-ip-based-session-management/2008-01-29T10:39:22.000Zdaily1.0https://www.gnucitizen.org/blog/holes-in-embedded-devices-ip-based-session-management/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/how-to-make-money-with-xss/2007-09-10T15:27:59.000Zdaily1.0https://www.gnucitizen.org/blog/how-to-make-money-with-xss/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/how-to-write-ajax-worms-theoretical-point-of-view/2007-01-07T14:26:26.000Zdaily1.0https://www.gnucitizen.org/blog/how-to-write-ajax-worms-theoretical-point-of-view/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/hscan-redux/2007-02-23T12:28:43.000Zdaily1.0https://www.gnucitizen.org/blog/hscan-redux/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/i-dont-think-that-you-understand-firefox3-vulnerable-by-design/2007-08-25T19:35:40.000Zdaily1.0https://www.gnucitizen.org/blog/i-dont-think-that-you-understand-firefox3-vulnerable-by-design/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/identity-20-security/2007-08-18T07:41:22.000Zdaily1.0https://www.gnucitizen.org/blog/identity-20-security/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/identity-theft-attacks/2009-02-07T13:19:09.000Zdaily1.0https://www.gnucitizen.org/blog/identity-theft-attacks/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/ie-pwns-secondlife/2007-09-16T10:37:53.000Zdaily1.0https://www.gnucitizen.org/blog/ie-pwns-secondlife/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/infocrobes/2006-06-02T10:37:39.000Zdaily1.0https://www.gnucitizen.org/blog/interview-with-xs-snipers/2007-07-27T14:59:24.000Zdaily1.0https://www.gnucitizen.org/blog/interview-with-xs-snipers/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/introducing-backweb/2006-10-30T09:36:42.000Zdaily1.0https://www.gnucitizen.org/blog/introducing-backweb/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/introducing-technika-security-framework/2007-08-02T09:10:58.000Zdaily1.0https://www.gnucitizen.org/blog/introducing-technika-security-framework/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/introducing-xssdb/2006-09-24T11:18:37.000Zdaily1.0https://www.gnucitizen.org/blog/introducing-xssdb/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/introduction-to-intrusion-detection-systems/2006-06-03T09:33:31.000Zdaily1.0https://www.gnucitizen.org/blog/it-has-been-a-while/2018-06-30T09:49:53.000Zdaily1.0https://www.gnucitizen.org/blog/it-is-persistence/2009-02-25T11:25:20.000Zdaily1.0https://www.gnucitizen.org/blog/it-is-persistence/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/java-jar-attacks-and-features/2007-11-10T22:35:33.000Zdaily1.0https://www.gnucitizen.org/blog/java-jar-attacks-and-features/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/javascript-address-info/2006-08-12T08:26:47.000Zdaily1.0https://www.gnucitizen.org/blog/javascript-address-info/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/javascript-attack-channel/2006-10-02T04:14:57.000Zdaily1.0https://www.gnucitizen.org/blog/javascript-authorization-forcer/2006-08-15T21:32:48.000Zdaily1.0https://www.gnucitizen.org/blog/javascript-global-namespace-pollution/2008-02-07T10:11:56.000Zdaily1.0https://www.gnucitizen.org/blog/javascript-global-namespace-pollution/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/javascript-port-scanner/2006-08-01T19:37:52.000Zdaily1.0https://www.gnucitizen.org/blog/javascript-port-scanner/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/javascript-remoting-dangers/2007-01-30T21:31:08.000Zdaily1.0https://www.gnucitizen.org/blog/javascript-remoting-dangers/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/javascript-spider/2006-10-06T09:36:13.000Zdaily1.0https://www.gnucitizen.org/blog/javascript-spider/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/javascript-visited-link-scanner/2006-08-15T20:50:51.000Zdaily1.0https://www.gnucitizen.org/blog/javascript-visited-link-scanner/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/javascript-xss-scanner/2007-07-16T19:13:04.000Zdaily1.0https://www.gnucitizen.org/blog/javascript-xss-scanner/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/jeriko-group-and-source-code-repository/2009-04-28T06:50:39.000Zdaily1.0https://www.gnucitizen.org/blog/jeriko-group-and-source-code-repository/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/joe-walker-on-web-application-security/2007-10-30T20:31:55.000Zdaily1.0https://www.gnucitizen.org/blog/joe-walker-on-web-application-security/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/jython-shell/2006-06-25T19:22:55.000Zdaily1.0https://www.gnucitizen.org/blog/jython-shell/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/kiosk-hacking-when-there-is-nothing-else-left/2008-04-07T10:31:15.000Zdaily1.0https://www.gnucitizen.org/blog/kiosk-hacking-when-there-is-nothing-else-left/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/landing-blogsecurify/2008-06-26T08:45:30.000Zdaily1.0https://www.gnucitizen.org/blog/landing-blogsecurify/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/landing-proxify/2013-02-06T23:28:40.000Zdaily1.0https://www.gnucitizen.org/blog/landing-secapps/2008-09-29T19:08:09.000Zdaily1.0https://www.gnucitizen.org/blog/landing-secapps/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/landing-securlscom/2007-06-30T09:25:11.000Zdaily1.0https://www.gnucitizen.org/blog/landing-securlscom/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/lets-fix-the-web/2008-08-31T08:12:25.000Zdaily1.0https://www.gnucitizen.org/blog/lets-fix-the-web/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/links-digest-2021/2021-12-24T14:13:00.000Zdaily1.0https://www.gnucitizen.org/blog/maluc-on-javascript-worms/2006-10-10T01:51:16.000Zdaily1.0https://www.gnucitizen.org/blog/maluc-on-javascript-worms/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/massive-enumeration-toolset/2006-03-06T07:31:56.000Zdaily1.0https://www.gnucitizen.org/blog/messing-with-web-filtering-gateways/2009-01-14T17:49:26.000Zdaily1.0https://www.gnucitizen.org/blog/messing-with-web-filtering-gateways/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/more-advanced-clickjacking-ui-redress-attacks/2008-10-08T18:08:24.000Zdaily1.0https://www.gnucitizen.org/blog/more-advanced-clickjacking-ui-redress-attacks/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/more-on-gifars-and-other-dangerous-attacks/2008-08-03T16:40:39.000Zdaily1.0https://www.gnucitizen.org/blog/more-penetration-testing-goodness-with-jeriko/2009-04-07T21:14:29.000Zdaily1.0https://www.gnucitizen.org/blog/more-penetration-testing-goodness-with-jeriko/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/most-attractive-targets-saas/2008-06-18T10:42:40.000Zdaily1.0https://www.gnucitizen.org/blog/most-attractive-targets-saas/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/mozilla-prism-not-there-yet/2007-10-30T16:53:25.000Zdaily1.0https://www.gnucitizen.org/blog/mozilla-prism-not-there-yet/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/mpack-the-movie/2007-06-22T10:22:48.000Zdaily1.0https://www.gnucitizen.org/blog/mpack-the-movie/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/my-bh-las-vegas-slides/2008-09-09T10:30:05.000Zdaily1.0https://www.gnucitizen.org/blog/my-bh-las-vegas-slides/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/my-black-hat-talk/2008-08-01T13:23:39.000Zdaily1.0https://www.gnucitizen.org/blog/my-black-hat-talk/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/myspace-quicktime-worm-follow-up/2006-12-07T03:05:27.000Zdaily1.0https://www.gnucitizen.org/blog/myspace-quicktime-worm-follow-up/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/name-mdns-poisoning-attacks-inside-the-lan/2008-01-23T16:15:29.000Zdaily1.0https://www.gnucitizen.org/blog/name-mdns-poisoning-attacks-inside-the-lan/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/network-communication-api-editors-draft/2007-11-23T11:42:56.000Zdaily1.0https://www.gnucitizen.org/blog/network-communication-api-editors-draft/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/new-technique-to-perform-universal-website-hijacking/2008-09-20T14:56:05.000Zdaily1.0https://www.gnucitizen.org/blog/new-technique-to-perform-universal-website-hijacking/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/new-version-of-dnsmap-out/2009-02-22T16:42:19.000Zdaily1.0https://www.gnucitizen.org/blog/new-version-of-dnsmap-out/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/noscript-hscan/2007-02-28T22:57:00.000Zdaily1.0https://www.gnucitizen.org/blog/noscript-hscan/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/of-sec-cons-and-magstripe-gift-cards/2009-07-22T09:53:54.000Zdaily1.0https://www.gnucitizen.org/blog/old-school-remote-command-execution-vulnerabilities-on-avaya-intuity-audix-lx/2009-09-17T08:32:47.000Zdaily1.0https://www.gnucitizen.org/blog/on-browser-security-restrictions/2007-08-11T09:27:07.000Zdaily1.0https://www.gnucitizen.org/blog/on-browser-security-restrictions/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/on-security-buzzwords/2009-04-03T09:36:08.000Zdaily1.0https://www.gnucitizen.org/blog/on-security-buzzwords/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/one-drop-on-a-spider-web/2007-06-25T14:56:36.000Zdaily1.0https://www.gnucitizen.org/blog/one-drop-on-a-spider-web/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/open-source-documentary-on-net-neutrality/2007-06-26T21:33:04.000Zdaily1.0https://www.gnucitizen.org/blog/open-source-documentary-on-net-neutrality/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/openid-a-security-story/2007-08-20T10:15:48.000Zdaily1.0https://www.gnucitizen.org/blog/openid-a-security-story/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/openid-provides-a-better-security-model/2008-03-24T11:23:20.000Zdaily1.0https://www.gnucitizen.org/blog/openid-provides-a-better-security-model/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/owasp/2007-03-06T16:33:51.000Zdaily1.0https://www.gnucitizen.org/blog/owasp/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/owasp-day-2007/2007-09-09T09:36:32.000Zdaily1.0https://www.gnucitizen.org/blog/owasp-day-2007/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/owasp-europe-2008-ghent/2008-06-21T09:40:56.000Zdaily1.0https://www.gnucitizen.org/blog/owasp-usa-2007-appsec-conference/2007-11-18T20:51:36.000Zdaily1.0https://www.gnucitizen.org/blog/owasp-usa-2007-appsec-conference/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/owi-yet-another-anonymous-point-of-attack/2008-07-04T09:35:41.000Zdaily1.0https://www.gnucitizen.org/blog/owi-yet-another-anonymous-point-of-attack/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/owning-big-brother-hollywood-style-exploits-included/2007-09-28T18:43:14.000Zdaily1.0https://www.gnucitizen.org/blog/owning-big-brother-hollywood-style-exploits-included/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/owning-outlook-web-access-owa-users/2007-12-08T18:56:01.000Zdaily1.0https://www.gnucitizen.org/blog/owning-outlook-web-access-owa-users/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/pareto-principle-in-the-informtion-security-industry/2008-07-28T13:26:13.000Zdaily1.0https://www.gnucitizen.org/blog/pareto-principle-in-the-informtion-security-industry/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/persistent-bi-directional-communication-channels/2006-10-02T04:24:33.000Zdaily1.0https://www.gnucitizen.org/blog/persistent-bi-directional-communication-channels/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/persistent-csrf-and-the-hotlink-hell/2007-04-16T15:04:34.000Zdaily1.0https://www.gnucitizen.org/blog/persistent-csrf-and-the-hotlink-hell/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/persistent-xss-and-csrf-on-wireless-g-adsl-gateway-with-speedbooster-wag54gs/2007-11-20T20:51:16.000Zdaily1.0https://www.gnucitizen.org/blog/persistent-xss-and-csrf-on-wireless-g-adsl-gateway-with-speedbooster-wag54gs/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/playing-in-large/2007-02-06T14:18:53.000Zdaily1.0https://www.gnucitizen.org/blog/playing-in-large/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/preventing-csrf/2007-03-30T10:12:43.000Zdaily1.0https://www.gnucitizen.org/blog/preventing-csrf/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/professional-soldier/2008-07-23T15:44:48.000Zdaily1.0https://www.gnucitizen.org/blog/professional-soldier/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/promo-videos/2008-05-20T16:45:44.000Zdaily1.0https://www.gnucitizen.org/blog/promo-videos/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/pwnie-award-nominee/2008-07-24T12:36:06.000Zdaily1.0https://www.gnucitizen.org/blog/pwnie-award-nominee/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/python-ssl-mitm-proxy-and-more/2009-02-14T17:54:19.000Zdaily1.0https://www.gnucitizen.org/blog/python-ssl-mitm-proxy-and-more/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/quicktime-0day-for-vista-and-xp/2008-04-25T17:57:42.000Zdaily1.0https://www.gnucitizen.org/blog/quicktime-0day-for-vista-and-xp/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/r00ting-public-wifi-networks-dhcp-name-poisoning-attacks/2008-01-25T12:19:15.000Zdaily1.0https://www.gnucitizen.org/blog/r00ting-public-wifi-networks-dhcp-name-poisoning-attacks/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/rain-of-minus-transactions/2007-09-11T11:43:15.000Zdaily1.0https://www.gnucitizen.org/blog/rain-of-minus-transactions/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/rdf-is-fun/2006-06-27T09:43:44.000Zdaily1.0https://www.gnucitizen.org/blog/reconsidering-the-side-jacking-attack/2008-02-17T17:11:19.000Zdaily1.0https://www.gnucitizen.org/blog/reconsidering-the-side-jacking-attack/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/remote-desktop-command-fixation-attacks/2007-10-10T11:00:42.000Zdaily1.0https://www.gnucitizen.org/blog/remote-desktop-command-fixation-attacks/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/rethinking-the-desktop-model/2008-09-02T22:21:28.000Zdaily1.0https://www.gnucitizen.org/blog/rethinking-the-desktop-model/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/reverse-shell-with-bash/2008-04-19T11:03:39.000Zdaily1.0https://www.gnucitizen.org/blog/reverse-shell-with-bash/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/reviewing-practical-php-exploitation-techniques/2008-04-04T10:22:20.000Zdaily1.0https://www.gnucitizen.org/blog/reviewing-practical-php-exploitation-techniques/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/risk-2008-oslo/2008-06-21T09:21:35.000Zdaily1.0https://www.gnucitizen.org/blog/router-hacking-challenge/2008-02-03T16:15:28.000Zdaily1.0https://www.gnucitizen.org/blog/router-hacking-challenge/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/router-hacking-is-for-schoolgirls-or-the-csrf-of-death/2008-03-03T10:28:34.000Zdaily1.0https://www.gnucitizen.org/blog/script-kiddies/2008-10-25T09:22:50.000Zdaily1.0https://www.gnucitizen.org/blog/script-kiddies/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/searching-for-evil/2007-08-31T09:47:10.000Zdaily1.0https://www.gnucitizen.org/blog/searching-for-evil/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/secure-code-through-frameworks/2006-12-22T18:32:49.000Zdaily1.0https://www.gnucitizen.org/blog/secure-code-through-frameworks/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/security-and-hacking-scene-in-london/2007-12-11T21:04:10.000Zdaily1.0https://www.gnucitizen.org/blog/security-and-hacking-scene-in-london/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/security-buzzword-generator/2009-04-02T11:27:25.000Zdaily1.0https://www.gnucitizen.org/blog/security-buzzword-generator/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/security-certifications/2008-10-06T16:33:37.000Zdaily1.0https://www.gnucitizen.org/blog/security-certifications/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/security-common-sense/2007-12-18T15:53:23.000Zdaily1.0https://www.gnucitizen.org/blog/security-common-sense/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/security-tool-controversy/2007-07-10T22:29:08.000Zdaily1.0https://www.gnucitizen.org/blog/security-tool-controversy/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/security-vs-accessibility/2006-08-26T01:19:27.000Zdaily1.0https://www.gnucitizen.org/blog/self-contained-xss-attacks/2006-09-22T11:52:17.000Zdaily1.0https://www.gnucitizen.org/blog/self-contained-xss-attacks/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/severe-xss-in-google-and-others-due-to-the-jar-protocol-issues/2007-11-10T11:39:16.000Zdaily1.0https://www.gnucitizen.org/blog/severe-xss-in-google-and-others-due-to-the-jar-protocol-issues/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/sex-candies-and-bookmarklet-exploits/2007-03-17T22:12:31.000Zdaily1.0https://www.gnucitizen.org/blog/sex-candies-and-bookmarklet-exploits/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/simple-universal-authentication-system/2008-09-24T20:29:21.000Zdaily1.0https://www.gnucitizen.org/blog/simple-universal-authentication-system/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/skydive/2009-09-07T19:12:26.000Zdaily1.0https://www.gnucitizen.org/blog/skydive/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/snippets-of-defense-pti/2007-10-07T12:17:48.000Zdaily1.0https://www.gnucitizen.org/blog/snippets-of-defense-pti/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/snippets-of-defense-ptii/2007-10-13T07:29:41.000Zdaily1.0https://www.gnucitizen.org/blog/snippets-of-defense-ptii/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/snippets-of-defense-ptiii/2007-10-20T08:47:10.000Zdaily1.0https://www.gnucitizen.org/blog/snippets-of-defense-ptiii/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/snippets-of-defense-ptiv/2007-10-31T10:41:28.000Zdaily1.0https://www.gnucitizen.org/blog/snippets-of-defense-ptiv/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/snoop-onto-them-as-they-snoop-onto-us/2007-07-21T08:47:37.000Zdaily1.0https://www.gnucitizen.org/blog/snoop-onto-them-as-they-snoop-onto-us/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/social-media-security/2008-09-22T10:57:46.000Zdaily1.0https://www.gnucitizen.org/blog/social-media-security/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/social-networks-evil-twin-attacks/2008-02-18T21:01:42.000Zdaily1.0https://www.gnucitizen.org/blog/social-networks-evil-twin-attacks/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/social-networks-mayhem/2007-04-30T14:27:20.000Zdaily1.0https://www.gnucitizen.org/blog/social-networks-mayhem/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/sploiter-splog/2006-11-18T07:04:25.000Zdaily1.0https://www.gnucitizen.org/blog/sploiter-splog/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/steal-his-wi-fi/2008-01-11T07:01:23.000Zdaily1.0https://www.gnucitizen.org/blog/steal-his-wi-fi/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/step-one-become-an-insider/2007-11-30T12:41:18.000Zdaily1.0https://www.gnucitizen.org/blog/step-one-become-an-insider/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/strategic-geoip-hacking-and-tv-streaming-theft/2007-11-16T14:22:00.000Zdaily1.0https://www.gnucitizen.org/blog/strategic-geoip-hacking-and-tv-streaming-theft/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/strategic-hacking-geoip/2007-10-12T10:52:56.000Zdaily1.0https://www.gnucitizen.org/blog/strategic-hacking-geoip/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/stuxnet/2011-06-13T15:21:37.000Zdaily1.0https://www.gnucitizen.org/blog/stuxnet/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/submit-your-top-web-hacking-techniques-for-2008/2009-01-30T00:03:06.000Zdaily1.0https://www.gnucitizen.org/blog/submit-your-top-web-hacking-techniques-for-2008/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/system-hacking-from-the-browser-the-python-style/2007-12-05T21:39:01.000Zdaily1.0https://www.gnucitizen.org/blog/system-hacking-from-the-browser-the-python-style/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/target-profiling-with-windows/2008-04-07T16:28:40.000Zdaily1.0https://www.gnucitizen.org/blog/targeted/2008-08-12T22:21:34.000Zdaily1.0https://www.gnucitizen.org/blog/targeted/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/technika/2007-01-31T22:37:26.000Zdaily1.0https://www.gnucitizen.org/blog/technika/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/the-0xss-credo/2006-11-05T07:13:28.000Zdaily1.0https://www.gnucitizen.org/blog/the-0xss-credo/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/the-10000-sites-js-malware-source-code-leaked/2008-03-22T07:16:50.000Zdaily1.0https://www.gnucitizen.org/blog/the-10000-sites-js-malware-source-code-leaked/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/the-agile-hacking-project/2008-12-06T22:25:19.000Zdaily1.0https://www.gnucitizen.org/blog/the-agile-hacking-project/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/the-attack-of-the-tiny-urls/2006-11-16T02:41:30.000Zdaily1.0https://www.gnucitizen.org/blog/the-attack-of-the-tiny-urls/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/the-cloud-is-not-that-insecure/2008-11-21T15:06:01.000Zdaily1.0https://www.gnucitizen.org/blog/the-cloud-is-not-that-insecure/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/the-computer-misused-act/2008-04-01T19:37:46.000Zdaily1.0https://www.gnucitizen.org/blog/the-computer-misused-act/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/the-generic-xss-worm/2007-06-20T22:52:15.000Zdaily1.0https://www.gnucitizen.org/blog/the-generic-xss-worm/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/the-new-dawn-of-filter-evasion/2007-07-13T06:57:16.000Zdaily1.0https://www.gnucitizen.org/blog/the-new-dawn-of-filter-evasion/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/the-orkut-xss-worm/2007-12-19T11:15:27.000Zdaily1.0https://www.gnucitizen.org/blog/the-orkut-xss-worm/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/the-pownce-worm/2008-02-13T08:31:02.000Zdaily1.0https://www.gnucitizen.org/blog/the-pownce-worm/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/the-public-perception-of-the-image-of-hackers/2008-05-05T23:11:05.000Zdaily1.0https://www.gnucitizen.org/blog/the-quicktime-vulnerability-overview/2008-09-10T10:57:32.000Zdaily1.0https://www.gnucitizen.org/blog/the-shadow/2007-02-02T14:26:48.000Zdaily1.0https://www.gnucitizen.org/blog/the-shadow/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/the-state-of-wifi-security/2008-03-21T07:10:23.000Zdaily1.0https://www.gnucitizen.org/blog/the-state-of-wifi-security/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/the-value-of-automated-security-tests/2007-12-04T21:28:16.000Zdaily1.0https://www.gnucitizen.org/blog/the-value-of-automated-security-tests/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/the-way-of-logic-into-dans-dns-flaw/2008-07-17T10:49:37.000Zdaily1.0https://www.gnucitizen.org/blog/the-way-of-logic-into-dans-dns-flaw/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/the-year-of-2007/2006-12-29T08:45:48.000Zdaily1.0https://www.gnucitizen.org/blog/the-year-of-2007/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/there-is-no-spoon/2008-04-21T10:22:11.000Zdaily1.0https://www.gnucitizen.org/blog/there-is-no-spoon/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/thoughts-on-jsping/2006-10-09T07:46:42.000Zdaily1.0https://www.gnucitizen.org/blog/thoughts-on-jsping/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/thoughts-on-the-certificate-authority-attack-presented-at-ccc/2008-12-31T11:02:05.000Zdaily1.0https://www.gnucitizen.org/blog/thoughts-on-the-certificate-authority-attack-presented-at-ccc/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/thoughts-on-zero-trust/2020-06-08T10:46:28.000Zdaily1.0https://www.gnucitizen.org/blog/tomorrows-malware/2008-05-20T10:37:43.000Zdaily1.0https://www.gnucitizen.org/blog/tomorrows-malware/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/tomorrows-trojan-peddlers/2007-11-10T09:11:43.000Zdaily1.0https://www.gnucitizen.org/blog/tools-of-trade/2009-04-10T20:18:31.000Zdaily1.0https://www.gnucitizen.org/blog/tools-of-trade/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/total-surveillance-made-easy-with-voip-phones/2008-02-11T23:03:43.000Zdaily1.0https://www.gnucitizen.org/blog/total-surveillance-made-easy-with-voip-phones/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/trapping-http-requests-and-responses-with-python/2009-02-18T11:52:34.000Zdaily1.0https://www.gnucitizen.org/blog/trapping-http-requests-and-responses-with-python/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/traversing-the-web/2006-10-10T06:48:09.000Zdaily1.0https://www.gnucitizen.org/blog/traversing-the-web/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/twitters-security-is-so-poor/2009-01-29T23:17:21.000Zdaily1.0https://www.gnucitizen.org/blog/twitters-security-is-so-poor/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/u-r-insecure-how-uri-exploits-are-changing-the-webappsec-landscape/2007-07-27T14:59:53.000Zdaily1.0https://www.gnucitizen.org/blog/universal-pdf-xss-after-party/2007-01-04T12:14:52.000Zdaily1.0https://www.gnucitizen.org/blog/universal-pdf-xss-after-party/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/unveiling-shoulder-skimming/2007-12-12T16:42:58.000Zdaily1.0https://www.gnucitizen.org/blog/unveiling-shoulder-skimming/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/upnp-the-saga-continues/2008-01-20T20:35:27.000Zdaily1.0https://www.gnucitizen.org/blog/upnp-the-saga-continues/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/username-enumeration-vulnerabilities/2007-04-04T09:34:18.000Zdaily1.0https://www.gnucitizen.org/blog/username-enumeration-vulnerabilities/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/using-the-infocrobes-package/2006-06-06T10:00:01.000Zdaily1.0https://www.gnucitizen.org/blog/vbscript-to-rule-ie/2007-03-16T10:36:09.000Zdaily1.0https://www.gnucitizen.org/blog/vbscript-to-rule-ie/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/virtualizations/2008-06-19T10:14:16.000Zdaily1.0https://www.gnucitizen.org/blog/virtualizations/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/viva-la-defcon/2008-08-13T06:19:42.000Zdaily1.0https://www.gnucitizen.org/blog/vulnerabilities-in-skype/2008-01-17T21:03:04.000Zdaily1.0https://www.gnucitizen.org/blog/vulnerabilities-in-skype/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/we-need-better-web-tools/2008-11-21T17:33:26.000Zdaily1.0https://www.gnucitizen.org/blog/we-need-better-web-tools/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/web-client-fuzzer_py/2007-10-24T22:00:50.000Zdaily1.0https://www.gnucitizen.org/blog/web-client-fuzzer_py/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/web-mayhem-firefoxs-jar-protocol-issues/2007-11-07T00:51:46.000Zdaily1.0https://www.gnucitizen.org/blog/web-mayhem-firefoxs-jar-protocol-issues/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/web-pages-from-hell/2006-09-11T21:23:31.000Zdaily1.0https://www.gnucitizen.org/blog/web-pages-from-hell/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/web-pages-from-hell-2/2006-11-15T02:39:52.000Zdaily1.0https://www.gnucitizen.org/blog/web-pages-from-hell-2/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/web20-is-not-ajax/2007-08-09T09:57:42.000Zdaily1.0https://www.gnucitizen.org/blog/well-websecurify-runs-on-the-iphone/2011-08-04T16:27:04.000Zdaily1.0https://www.gnucitizen.org/blog/what-happens-to-your-computer-if-you-mispell-googlecom/2007-01-21T11:41:44.000Zdaily1.0https://www.gnucitizen.org/blog/what-happens-to-your-computer-if-you-mispell-googlecom/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/what-is-black-pr/2008-03-29T17:49:52.000Zdaily1.0https://www.gnucitizen.org/blog/why-httponly-wont-protect-you/2007-04-12T08:27:07.000Zdaily1.0https://www.gnucitizen.org/blog/why-httponly-wont-protect-you/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/wifi-infestations-viral-wardriving/2008-02-20T12:04:54.000Zdaily1.0https://www.gnucitizen.org/blog/wifi-infestations-viral-wardriving/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/wifi-ownage/2008-02-07T10:59:13.000Zdaily1.0https://www.gnucitizen.org/blog/wifi-ownage/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/windows-defence-and-attacks/2006-06-03T09:23:36.000Zdaily1.0https://www.gnucitizen.org/blog/wormx/2007-01-22T23:01:33.000Zdaily1.0https://www.gnucitizen.org/blog/wormx/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/wp-blogsecurify/2008-10-26T08:09:04.000Zdaily1.0https://www.gnucitizen.org/blog/wp-blogsecurify/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/writing-good-bug-bounty-reports/2019-07-08T21:18:00.000Zdaily1.0https://www.gnucitizen.org/blog/ws-discovery/2006-06-06T08:45:42.000Zdaily1.0https://www.gnucitizen.org/blog/wsdl-digest-200606/2006-06-30T09:39:58.000Zdaily1.0https://www.gnucitizen.org/blog/xss-attacks-book-preview/2007-04-25T10:20:26.000Zdaily1.0https://www.gnucitizen.org/blog/xss-attacks-book-preview/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/xss-attacks-cross-site-scripting-exploits-and-defence/2007-06-23T09:47:27.000Zdaily1.0https://www.gnucitizen.org/blog/xss-prelude/2007-01-06T18:01:32.000Zdaily1.0https://www.gnucitizen.org/blog/xss-shell-and-something-more/2006-11-04T08:15:22.000Zdaily1.0https://www.gnucitizen.org/blog/xss-shell-and-something-more/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/xss-worms-and-mitigation-controls/2007-06-23T13:52:13.000Zdaily1.0https://www.gnucitizen.org/blog/xss-worms-and-mitigation-controls/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/xssdb/2006-09-24T02:55:35.000Zdaily1.0https://www.gnucitizen.org/blog/xssdb/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/xssing-the-lan/2006-08-03T23:14:01.000Zdaily1.0https://www.gnucitizen.org/blog/xssing-the-lan-2/2006-08-04T09:07:31.000Zdaily1.0https://www.gnucitizen.org/blog/xssing-the-lan-3/2006-08-08T13:02:33.000Zdaily1.0https://www.gnucitizen.org/blog/xssing-the-lan-3/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/xssing-the-lan-4/2006-08-09T12:41:51.000Zdaily1.0https://www.gnucitizen.org/blog/yahoo-site-explorer-spider/2007-07-15T21:47:10.000Zdaily1.0https://www.gnucitizen.org/blog/yahoo-site-explorer-spider/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/you-and-your-research/2012-12-05T00:40:04.000Zdaily1.0https://www.gnucitizen.org/blog/you-dont-need-the-ultimate-pen-testing-framework/2009-02-23T12:50:02.000Zdaily1.0https://www.gnucitizen.org/blog/you-dont-need-the-ultimate-pen-testing-framework/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/zero-degrees-of-seperation/2007-05-09T15:12:01.000Zdaily1.0https://www.gnucitizen.org/blog/zero-degrees-of-seperation/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/blog/zero-trust-security/2020-06-01T10:05:27.000Zdaily1.0https://www.gnucitizen.org/blog/zombiemap/2007-03-21T11:57:38.000Zdaily1.0https://www.gnucitizen.org/blog/zyxel-gateways-vulnerability-research-part-2/2008-04-02T23:50:24.000Zdaily1.0https://www.gnucitizen.org/blog/zyxel-gateways-vulnerability-research-part-2/comments.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/files/2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/members/pdp.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/about.html2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/feed.xml2022-10-31T17:55:50.352Zdaily1.0https://www.gnucitizen.org/projects.html2022-10-31T17:55:50.352Zdaily1.0