<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
<url>
<loc>https://codiceinsicuro.it/chicchi/2016-03-23-keystore-non-solo-certificati/</loc>
<lastmod>2016-03-30T15:20:29+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/chicchi/2016-03-30-come-creare-numeri-pseudocasuali-in-ruby/</loc>
<lastmod>2016-03-30T15:20:29+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/chicchi/2016-09-06-automatizzare-owasp-zap-in-mac-os-x/</loc>
<lastmod>2016-09-06T08:47:24+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/mb/devo-studiare/</loc>
<lastmod>2022-12-16T11:14:31+01:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/mb/metodologie_agili/</loc>
<lastmod>2022-12-16T11:14:31+01:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/mb/non-e-cambiato-nulla/</loc>
<lastmod>2022-12-16T11:14:31+01:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/mb/peccato-originale/</loc>
<lastmod>2022-12-16T11:14:31+01:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/mb/prologo/</loc>
<lastmod>2022-12-16T11:14:31+01:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/news/2016-08-30-ecco-gli-strumenti-usati-per-violare-il-sistema-di-voto-elettronico-americano/</loc>
<lastmod>2019-04-25T19:23:04+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/news/2016-08-30-mozilla-lancia-observatory-un-tool-per-lanalisi-della-configurazione-dei-siti-web/</loc>
<lastmod>2019-04-25T19:23:04+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/news/2016-08-30-una-variante-del-malware-locky-si-distribuisce-come-dll/</loc>
<lastmod>2019-04-25T19:23:04+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/news/2016-08-31-12-milioni-di-bath-trafugati-grazie-ad-un-malware-agli-atm/</loc>
<lastmod>2019-04-25T19:23:04+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/news/2016-08-31-bucato-il-saas-per-le-password-onelogin/</loc>
<lastmod>2019-04-25T19:23:04+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/news/2016-08-31-la-famiglia-di-malware-bashlite-all-attacco-dell-iot/</loc>
<lastmod>2019-04-25T19:23:04+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/news/2016-08-31-trafugati-database-del-2012-di-dropbox/</loc>
<lastmod>2019-04-25T19:23:04+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/news/2016-09-01-fairware-server-linux-sotto-attacco/</loc>
<lastmod>2019-04-25T19:23:04+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/news/2016-09-01-fantom-il-falso-windows-update/</loc>
<lastmod>2019-04-25T19:23:04+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/news/2016-09-06-800000-account-trafugati-dal-sito-porno-bruzzers/</loc>
<lastmod>2019-04-25T19:23:04+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/news/2016-09-07-libero-mail-violato-il-database-degli-utenti-conferma-ufficiale/</loc>
<lastmod>2019-04-25T19:23:04+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/news/2016-09-27-milioni-di-device-cisco-a-rischio-a-causa-di-nsa/</loc>
<lastmod>2019-04-25T19:23:04+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/news/2016-09-27-openssl-mette-una-pezza-dot-dot-dot-alla-pezza/</loc>
<lastmod>2019-04-25T19:23:04+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/news/2016-09-27-sofacy-allattacco-delle-macchine-osx-con-il-trojan-komplex/</loc>
<lastmod>2019-04-25T19:23:04+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/news/2016-10-06-fornitore-del-nsa-arrestato-per-furto-di-dati/</loc>
<lastmod>2019-04-25T19:23:04+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/news/2016-10-06-il-codice-sorgente-di-mirai-e-pubblico/</loc>
<lastmod>2019-04-25T19:23:04+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/news/2016-10-06-yahoo-accedeva-al-contenuto-delle-email-per-conto-del-governo-usa/</loc>
<lastmod>2019-04-25T19:23:04+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/news/2016-10-11-centrale-nucleare-tedesca-vittima-di-un-attacco-informatico/</loc>
<lastmod>2019-04-25T19:23:04+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/news/2016-10-11-cve-2016-5425-root-privilege-escalation-per-tomcat/</loc>
<lastmod>2019-04-25T19:23:04+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/news/2016-10-18-gli-autori-di-dyre-al-lavoro-su-un-nuovo-trojan/</loc>
<lastmod>2019-04-25T19:23:04+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/news/2016-10-18-mirai-ed-il-pericolo-di-altri-ddos/</loc>
<lastmod>2019-04-25T19:23:04+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/news/2016-11-01-ancora-su-android-e-ios-su-temi-di-sicurezza/</loc>
<lastmod>2019-04-25T19:23:04+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/news/2016-11-01-il-regno-unito-ora-e-cyber/</loc>
<lastmod>2019-04-25T19:23:04+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/news/2017-02-07-f-star-star-k-donald-trump-contestazione-al-tempo-dellhack/</loc>
<lastmod>2019-04-25T19:23:04+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/news/2017-02-07-malware-hotel-e-carte-di-credito-tutto-cosi-reale/</loc>
<lastmod>2019-04-25T19:23:04+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/news/2017-02-07-wordpress-ha-chiuso-in-silenzio-una-privilege-escalation-tutti-ad-aggiornare/</loc>
<lastmod>2019-04-25T19:23:04+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/news/2017-02-08-applicazioni-ios-e-problemi-di-tls/</loc>
<lastmod>2019-04-25T19:23:04+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/news/2017-02-08-la-polonia-il-malware-e-il-governo/</loc>
<lastmod>2019-04-25T19:23:04+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/news/2017-02-08-smart-tv-e-violazione-della-privacy/</loc>
<lastmod>2019-04-25T19:23:04+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/news/2017-02-09-corretto-un-xss-in-steam/</loc>
<lastmod>2019-04-25T19:23:04+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/news/2017-02-09-nuovi-malware-solo-in-memoria/</loc>
<lastmod>2019-04-25T19:23:04+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/blog/heartbleed-parte-1-la-chiacchiera-da-pub/</loc>
<lastmod>2019-04-25T19:23:04+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/blog/heartbleed-parte-2-chiacchierata-da-pub-ma-tecnica-questa-volta/</loc>
<lastmod>2019-04-25T19:23:04+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/blog/scopriamo-insieme-la-superficie-dattacco/</loc>
<lastmod>2019-04-25T19:23:04+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/blog/lupgrade-di-mavericks-e-il-format-bug-di-safari/</loc>
<lastmod>2019-04-25T19:23:04+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/blog/litaglia-e-sicura-posso-gia-chiudere-il-blog/</loc>
<lastmod>2019-04-25T19:23:04+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/blog/recuperare-informazioni-via-snmp-con-ruby/</loc>
<lastmod>2019-04-25T19:23:04+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/blog/creiamo-una-stringa-di-caratteri-casuali-con-owasp-esapi-e-java/</loc>
<lastmod>2019-05-21T17:04:56+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/blog/ricordami-perche-lo-faccio-non-e-un-lavoro-per-tutti/</loc>
<lastmod>2019-04-25T19:23:04+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/blog/se-paghi-noccioline-attirerai-scimmie-storie-job-posting-nellera-delle-startup/</loc>
<lastmod>2019-04-25T19:23:04+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/blog/come-usare-questo-blog/</loc>
<lastmod>2019-04-25T19:23:04+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/blog/automatizzare-automatizzare-automatizzare-quando-non-puoi-fare-tutto-tu/</loc>
<lastmod>2019-04-25T19:23:04+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/blog/date-una-linea-guida-al-ragazzo/</loc>
<lastmod>2019-04-25T19:23:04+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/blog/come-salvare-la-password-dei-propri-utenti-e-vivere-sereni-un-data-breach/</loc>
<lastmod>2019-04-25T19:23:04+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/blog/difendiamo-i-nostri-utenti-con-i-secure-headers/</loc>
<lastmod>2020-08-28T11:31:20+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/blog/la-sicurezza-invisibile-abusing-jsonp-e-la-risposta-della-community-rails/</loc>
<lastmod>2019-04-25T19:23:04+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/blog/codiceinsicuro-su-bloglovin/</loc>
<lastmod>2019-04-25T19:23:04+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/blog/la-non-cultura-dellasap/</loc>
<lastmod>2019-04-25T19:23:04+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/blog/ssdlc-alla-ricerca-del-process-perduto/</loc>
<lastmod>2022-12-16T11:14:31+01:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/blog/lestate-sta-finendo-e-un-anno-iniziera/</loc>
<lastmod>2019-04-25T19:23:04+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/blog/la-sicurezza-applicativa-e-il-nuovo-off-topic/</loc>
<lastmod>2019-04-25T19:23:04+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/blog/lasap-parte-da-solide-fondamenta-ed-una-lucente-armatura/</loc>
<lastmod>2019-04-25T19:23:04+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/blog/i-cross-site-scripting-non-sono-tornati-sono-sempre-stati-qui/</loc>
<lastmod>2019-04-25T19:23:04+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/blog/shellshock-capitolo-1-la-prova-pratica-che-le-code-review-servono/</loc>
<lastmod>2019-04-25T19:23:04+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/blog/shellshock-automatizziamo-il-test/</loc>
<lastmod>2019-04-25T19:23:04+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/blog/la-number-billofrights-itagliana-servira-una-legge-anche-per-dire-che-il-cielo-e-blu/</loc>
<lastmod>2019-04-25T19:23:04+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/blog/poodle-scacco-ad-ssl-3-dot-0/</loc>
<lastmod>2019-04-25T19:23:04+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/blog/shellshock-quando-il-codice-e-sotto-nafta/</loc>
<lastmod>2019-04-25T19:23:04+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/blog/tesoro-si-e-rotto-il-blog/</loc>
<lastmod>2019-04-25T19:23:04+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/blog/paga-i-tuoi-debiti-storie-di-malware-del-giovedi/</loc>
<lastmod>2019-04-25T19:23:04+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/blog/netcrash-tensione-ai-contorni-della-nuvola/</loc>
<lastmod>2019-04-25T19:23:04+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/blog/quanto-costa-un-pentest/</loc>
<lastmod>2019-04-25T19:23:04+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/blog/propositi-e-previsioni-per-la-sicurezza-applicativa-nel-2015/</loc>
<lastmod>2019-04-25T19:23:04+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/blog/come-la-vuole-la-disclosure-full-o-responsible/</loc>
<lastmod>2019-04-25T19:23:04+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/blog/cve-2015-1383-xss-nel-plugin-wordpress-geo-mashup-e-code-review-metropolitana/</loc>
<lastmod>2019-04-25T19:23:04+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/blog/io-sono-molto-preoccupato-owasp-italia-ha-bisogno-di-te/</loc>
<lastmod>2019-04-25T19:23:04+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/blog/wordstress-penetration-testing-whitebox-per-wordpress/</loc>
<lastmod>2019-04-25T19:23:04+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/blog/i-tool-di-code-review-croce-o-delizia/</loc>
<lastmod>2019-04-25T19:23:04+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/blog/testiamo-in-automatico-le-password-dei-nostri-utenti/</loc>
<lastmod>2019-04-25T19:23:04+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/blog/cose-un-penetration-test-applicativo-web/</loc>
<lastmod>2019-04-25T19:23:04+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/blog/esercizio-di-codereview-in-php-un-semplice-blogging-engine/</loc>
<lastmod>2019-04-25T19:23:04+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/blog/spiega-la-sicurezza-informatica-al-marketing/</loc>
<lastmod>2019-04-25T19:23:04+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/blog/costruiamo-un-sistema-di-autenticazione-con-sinatra-e-warden-parte-1/</loc>
<lastmod>2019-04-25T19:23:04+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/blog/ms15-034-iis-denial-of-service-con-una-sola-richiesta-http/</loc>
<lastmod>2019-04-25T19:23:04+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/blog/costruiamo-un-sistema-di-autenticazione-con-sinatra-e-warden-parte-2/</loc>
<lastmod>2019-04-25T19:23:04+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/blog/grazie-internet-of-things/</loc>
<lastmod>2019-04-25T19:23:04+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/blog/wordpress-4-dot-2-rilasciato-e-vulnerabile-a-stored-xss/</loc>
<lastmod>2022-12-16T11:14:31+01:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/blog/costruiamo-un-sistema-di-autenticazione-con-sinatra-e-warden-parte-3/</loc>
<lastmod>2019-04-25T19:23:04+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/blog/chi-li-paga-poi-i-danni/</loc>
<lastmod>2019-04-25T19:23:04+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/blog/i-pirati-della-sicurezza-applicativa/</loc>
<lastmod>2019-04-25T19:23:04+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/blog/automattic-compra-woocommerce-e-wordpress-diventa-adulto/</loc>
<lastmod>2019-04-25T19:23:04+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/blog/storie-di-anonimi-campioni-e-password-in-chiaro/</loc>
<lastmod>2019-04-25T19:23:04+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/blog/dal-file-apk-al-codice-sorgente-in-poche-semplici-mosse/</loc>
<lastmod>2019-09-04T17:45:27+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/blog/usare-apple-e-veramente-contrario-alletica/</loc>
<lastmod>2019-04-25T19:23:04+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/blog/la-sicurezza-ora-e-cyber/</loc>
<lastmod>2019-04-25T19:23:04+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/blog/lastpass-security-breach-e-le-tue-password-nel-cloud/</loc>
<lastmod>2019-04-25T19:23:04+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/blog/premetto-io-non-sono-uno-sviluppatore/</loc>
<lastmod>2019-04-25T19:23:04+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/blog/lo-hai-bucato-perche-e-un-server-di-test/</loc>
<lastmod>2019-04-25T19:23:04+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/blog/rubygems-vulnerabile-a-dns-hijack/</loc>
<lastmod>2019-04-25T19:23:04+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/blog/se-tolleri-questo-il-tuo-sito-potrebbe-essere-il-prossimo/</loc>
<lastmod>2019-04-25T19:23:04+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/blog/hackingteam-e-la-storia-del-figlio-del-calzolaio/</loc>
<lastmod>2019-04-25T19:23:04+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/blog/lattacco-ad-hacking-team-e-la-scena-forcaiola-italiana/</loc>
<lastmod>2019-04-25T19:23:04+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/blog/asphyxia-number-1-ma-rcs-installa-immagini-pedopornografiche/</loc>
<lastmod>2019-04-25T19:23:04+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/blog/la-mia-formazione-3-4-3-o-4-3-1-2/</loc>
<lastmod>2019-04-25T19:23:04+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/blog/come-fare-un-vulnerability-assessment-con-nmap/</loc>
<lastmod>2019-04-25T19:23:04+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/blog/bettercap-rimettiamo-al-centro-lattaccante/</loc>
<lastmod>2019-04-25T19:23:04+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/blog/spid-con-ssl3-e-tls1-dot-0-saremo-tutti-securizzati/</loc>
<lastmod>2019-04-25T19:23:04+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/blog/domenica-dagosto-che-caldo-fa/</loc>
<lastmod>2019-04-25T19:23:04+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/blog/bicchieri-di-acqua-e-menta/</loc>
<lastmod>2019-04-25T19:23:04+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/blog/your-web-application-seen-from-the-hells-kitchen/</loc>
<lastmod>2019-04-25T19:23:04+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/blog/game-set-e-partita/</loc>
<lastmod>2019-04-25T19:23:04+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/blog/mr-dot-robot/</loc>
<lastmod>2019-04-25T19:23:04+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/blog/lhacking-e-etico-e-riempire-lict-di-fuffa/</loc>
<lastmod>2019-04-25T19:23:04+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/blog/cerchiamo-un-host-in-nexpose-con-ruby/</loc>
<lastmod>2019-04-25T19:23:04+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/blog/le-web-agency-sono-il-nuovo-cavallo-di-troia/</loc>
<lastmod>2019-04-25T19:23:04+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/blog/piovono-scimmiette/</loc>
<lastmod>2019-04-25T19:23:04+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/blog/la-lentezza-di-una-barra-16/</loc>
<lastmod>2019-04-25T19:23:04+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/blog/esplua-riflessioni-sul-check-point-security-tour-2015/</loc>
<lastmod>2019-04-25T19:23:04+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/blog/digital-spamionship/</loc>
<lastmod>2019-04-25T19:23:04+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/blog/il-tuo-git-su-internet-no-no-no/</loc>
<lastmod>2019-04-25T19:23:04+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/blog/quando-lopale-non-e-piu-trasparente/</loc>
<lastmod>2019-04-25T19:23:04+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/blog/di-pipeline-processi-ed-automazione/</loc>
<lastmod>2019-04-25T19:23:04+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/blog/propositi-e-previsioni-per-la-sicurezza-applicativa-nel-2016/</loc>
<lastmod>2022-12-16T11:14:31+01:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/blog/ladri-di-biciclette-https-bycycle-attack/</loc>
<lastmod>2019-04-25T19:23:04+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/blog/non-abbiate-paura/</loc>
<lastmod>2019-04-25T19:23:04+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/blog/tra-conflitti-di-interesse-e-007-addio-meritocrazia/</loc>
<lastmod>2022-12-16T11:14:31+01:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/blog/credenziali-amministrative-in-tempo-di-crisi/</loc>
<lastmod>2019-04-25T19:23:04+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/blog/una-nuova-ondata-di-ransomware/</loc>
<lastmod>2019-04-25T19:23:04+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/blog/mac-os-x-e-davvero-uno-unix-di-serie-b/</loc>
<lastmod>2019-04-25T19:23:04+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/blog/alla-ricerca-dell-esapi-perduta/</loc>
<lastmod>2019-04-25T19:23:04+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/blog/mac-os-x-sotto-il-cofano-il-system-integrity-protection/</loc>
<lastmod>2019-04-25T19:23:04+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/blog/come-ti-infetto-attraverso-il-browser/</loc>
<lastmod>2019-04-25T19:23:04+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/blog/apple-gli-hacker-l-fbi-e-l-insana-cultura-del-complotto/</loc>
<lastmod>2019-04-25T19:23:04+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/blog/linux-mint-la-iso-intorno-al-buco/</loc>
<lastmod>2019-04-25T19:23:04+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/blog/lettera-aperta-a-quintarelli-su-spid-e-security/</loc>
<lastmod>2019-04-25T19:23:04+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/blog/i-chicchi-di-programmazione-sicura-e-restyle-futuro/</loc>
<lastmod>2019-04-25T19:23:04+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/blog/qual-e-il-linguaggio-giusto-per-i-penetration-test-la-risposta-definitiva/</loc>
<lastmod>2019-04-25T19:23:04+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/blog/la-sicurezza-applicativa-e-veramente-un-facilitatore-di-flussi/</loc>
<lastmod>2019-04-25T19:23:04+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/blog/2-anni-son-passati/</loc>
<lastmod>2019-04-25T19:23:04+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/blog/come-fare-un-database-audit-con-nmap/</loc>
<lastmod>2021-12-13T10:09:50+01:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/blog/aprile-ed-i-suoi-attacchi-di-bile/</loc>
<lastmod>2019-04-25T19:23:04+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/blog/forum-di-bittorrent-compromesso-credenziali-in-pericolo/</loc>
<lastmod>2022-12-16T11:23:07+01:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/blog/32-milioni-di-account-twitter-trafugati-ancora-problemi-con-le-credenziali/</loc>
<lastmod>2022-12-16T11:23:07+01:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/blog/quando-la-spia-e-la-tastiera-del-tuo-smartphone-il-caso-flash-keyboard/</loc>
<lastmod>2019-04-25T19:23:04+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/blog/le-3-cose-piu-brutte-che-si-trovano-dopo-anni-di-vulnerability-assessment/</loc>
<lastmod>2019-04-25T19:23:04+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/blog/estate-di-cambiamenti-parte-1/</loc>
<lastmod>2019-04-25T19:23:04+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/blog/3-cose-che-devi-avere-per-partire-con-una-application-security-pipeline/</loc>
<lastmod>2019-09-04T17:45:27+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/blog/le-cose-che-uno-sviluppatore-deve-sapere-su-penetration-test-e-code-review/</loc>
<lastmod>2019-09-04T17:45:27+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/blog/affrontare-il-rientro/</loc>
<lastmod>2019-04-25T19:23:04+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/blog/tool-di-code-review-e-minority-report/</loc>
<lastmod>2019-04-25T19:23:04+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/blog/sono-tutti-open-con-il-source-degli-altri/</loc>
<lastmod>2019-04-25T19:23:04+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/blog/molto-benissimo-il-racconto-del-talk-a-isaca-venice/</loc>
<lastmod>2019-04-25T19:23:04+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/blog/lo-skill-shortage-e-lolio-di-palma/</loc>
<lastmod>2019-04-25T19:23:04+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/blog/dawnscanner-la-code-review-per-ruby-puo-parlare-italiano/</loc>
<lastmod>2019-04-25T19:23:04+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/blog/un-venerdi-di-passione-fuori-stagione/</loc>
<lastmod>2019-04-25T19:23:04+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/blog/questione-di-malloc/</loc>
<lastmod>2019-04-25T19:23:04+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/blog/racconti-da-codemotion/</loc>
<lastmod>2019-04-25T19:23:04+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/blog/offuschiamo-il-bytecode-java-per-divertimento-prima-parte/</loc>
<lastmod>2019-04-25T19:23:04+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/blog/propositi-e-previsioni-per-la-sicurezza-applicativa-nel-2017/</loc>
<lastmod>2019-04-25T19:23:04+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/blog/eyepiramid-il-grande-fratello-e-tra-noi/</loc>
<lastmod>2019-04-25T19:23:04+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/blog/erase-and-rewind/</loc>
<lastmod>2022-12-16T11:14:31+01:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/blog/ha-senso-veramente-fare-unanalisi-statica/</loc>
<lastmod>2019-04-25T19:23:04+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/blog/decifrare-semplici-javascript-malevoli/</loc>
<lastmod>2019-04-25T19:23:04+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/blog/entropia-password-e-passphrase/</loc>
<lastmod>2019-04-25T19:23:04+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/blog/vulnerabilita-collaterali/</loc>
<lastmod>2019-04-25T19:23:04+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/blog/write-up-non-serio-di-una-ctf-domenicale/</loc>
<lastmod>2019-04-25T19:23:04+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/blog/alcune-lezioni-dal-primo-tentativo-fallito-per-loscp/</loc>
<lastmod>2019-04-25T19:23:04+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/blog/getting-root-kioptrix-livello-1/</loc>
<lastmod>2019-04-25T19:23:04+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/blog/getting-root-kioptrix-livello-2/</loc>
<lastmod>2019-04-25T19:23:04+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/blog/getting-root-kioptrix-livello-3/</loc>
<lastmod>2019-04-25T19:23:04+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/blog/getting-root-sedna/</loc>
<lastmod>2019-04-25T19:23:04+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/blog/lillusione-di-un-mercato-che-non-ce-dot-dot-dot-ancora/</loc>
<lastmod>2019-04-25T19:23:04+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/blog/getting-root-railsgoat/</loc>
<lastmod>2019-04-25T19:23:04+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/blog/alcune-lezioni-dopo-il-secondo-tentativo-riuscito-di-certificarmi-oscp/</loc>
<lastmod>2019-04-25T19:23:04+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/blog/ioli-crackme-0x00/</loc>
<lastmod>2022-12-16T11:56:19+01:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/blog/getting-root-brainpan-1/</loc>
<lastmod>2022-12-16T11:56:19+01:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/blog/come-fare-un-vulnerability-assessment-con-nmap-parte-due/</loc>
<lastmod>2022-12-16T11:56:19+01:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/blog/hack-back-machismo-o-necessita/</loc>
<lastmod>2019-04-25T19:23:04+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/blog/nuove-strade-e-buon-natale/</loc>
<lastmod>2019-04-25T19:23:04+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/blog/alcune-lezioni-dal-primo-tentativo-fallito-per-losce/</loc>
<lastmod>2019-04-25T19:23:04+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/blog/shellerate-un-framework-per-generare-shellcode/</loc>
<lastmod>2022-12-16T11:14:31+01:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/blog/lalba-di-un-nuovo-giorno/</loc>
<lastmod>2019-09-04T17:45:27+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/blog/lawareness-fatto-finora-ha-fallito/</loc>
<lastmod>2019-05-02T15:55:43+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/blog/ecco-come-scegliere-una-password-robusta/</loc>
<lastmod>2021-01-06T15:28:59+01:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/blog/getting-root-unknowndevice64-1/</loc>
<lastmod>2022-12-16T11:56:19+01:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/blog/cosa-ho-imparato-costruendo-processi-di-patch-management/</loc>
<lastmod>2019-06-19T16:46:52+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/blog/crea-le-tue-api-di-telemetria-con-ruby-e-sinatra/</loc>
<lastmod>2019-05-29T00:06:04+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/blog/se-produci-software-il-problema-delle-licenze-terze-e-anche-tuo/</loc>
<lastmod>2019-06-03T12:35:16+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/blog/quest-estate-studiamo-come-si-fa-reverse-di-applicazioni-win32/</loc>
<lastmod>2019-06-11T14:32:18+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/blog/patch-ordinario-e-patch-straordinario/</loc>
<lastmod>2021-01-06T15:28:59+01:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/blog/diamo-unocchiata-a-msf-egghunter/</loc>
<lastmod>2021-01-06T15:28:59+01:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/blog/basic-insicuri-create-a-python-exploit-skeleton-template-in-gnome/</loc>
<lastmod>2022-12-16T11:14:31+01:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/blog/etica-mentre/</loc>
<lastmod>2019-09-04T17:48:24+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/blog/sessione-ama-il-prossimo-6-settembre/</loc>
<lastmod>2019-09-13T10:22:32+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/blog/come-offuscare-un-semplice-shellcode-parte-1/</loc>
<lastmod>2022-12-16T11:56:19+01:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/blog/dentro-al-microsoft-patching-tuesday-settembre-2019/</loc>
<lastmod>2019-09-17T17:26:28+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/blog/dentro-al-microsoft-patching-tuesday-ottobre-2019/</loc>
<lastmod>2022-12-16T11:14:31+01:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/blog/dentro-al-microsoft-patching-tuesday-dicembre-2019/</loc>
<lastmod>2022-12-16T11:14:31+01:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/blog/buona-fine-e-buon-inizio/</loc>
<lastmod>2020-01-14T22:59:02+01:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/blog/la-code-review-e-ancora-sexy/</loc>
<lastmod>2020-01-14T15:04:26+01:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/blog/dentro-al-microsoft-patching-tuesday-gennaio-2020/</loc>
<lastmod>2022-12-16T11:14:31+01:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/blog/getting-root-symfonos5/</loc>
<lastmod>2021-01-06T15:28:59+01:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/blog/la-cyber-ai-tempi-del-sars-cov-2/</loc>
<lastmod>2020-03-17T19:04:31+01:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/blog/hey-sono-io-paolo-e-non-sono-un-junior/</loc>
<lastmod>2020-05-07T16:31:59+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/blog/generare-una-chiave-rsa-che-funzioni-con-nexpose/</loc>
<lastmod>2020-05-07T16:31:59+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/blog/cosa-ho-imparato-dopo-aver-superato-lesame-per-osce/</loc>
<lastmod>2020-08-07T10:40:27+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/blog/nuovi-progetti-per-il-2021/</loc>
<lastmod>2022-12-16T11:23:07+01:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/blog/le-mie-wordlist-preferite/</loc>
<lastmod>2020-12-28T18:17:39+01:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/blog/ho-snaitech-e-quella-sensibilita-che-ancora-manca/</loc>
<lastmod>2021-01-06T15:28:59+01:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/blog/5-mesi-intensi-e-cambi-di-rotte/</loc>
<lastmod>2021-06-03T10:43:30+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/blog/alcune-lezioni-dal-primo-tentativo-fallito-per-loswe/</loc>
<lastmod>2021-06-03T10:43:30+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/blog/dentro-al-microsoft-patching-tuesday-luglio-2021/</loc>
<lastmod>2022-12-16T11:14:31+01:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/blog/biometria-opensuse-leap-e-lenovo-thinkpad-risolviamo-i-problemi/</loc>
<lastmod>2021-10-05T10:37:54+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/blog/open-vs-close-qual-e-il-software-piu-sicuro/</loc>
<lastmod>2021-11-19T17:25:42+01:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/blog/nuova-iniziativa-cybercoach-corner/</loc>
<lastmod>2025-08-01T11:56:56+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/blog/log4shell-la-catastrofe-informatica-corre-sui-log/</loc>
<lastmod>2022-03-15T15:13:55+01:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/blog/2022-lanno-che-verra/</loc>
<lastmod>2025-08-01T11:59:29+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/blog/il-mio-primo-anno-in-suse/</loc>
<lastmod>2022-03-15T15:13:55+01:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/2022/03/23/di-antivirus-etica-e-rischi-pindaric/</loc>
<lastmod>2022-12-16T12:12:04+01:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/2022/04/01/facciamo-behavior-driven-development-con-il-c/</loc>
<lastmod>2022-12-16T12:12:04+01:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/2022/04/04/e-se-il-problema-dell-antivirus-fosse-avere-il-codice-open/</loc>
<lastmod>2022-12-16T12:12:04+01:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/2022/04/16/non-mettete-regole-troppo-complesse-alle-vostre-password/</loc>
<lastmod>2022-12-16T12:12:04+01:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/2022/04/21/password-vs-passphrase-la-cracking-challenge/</loc>
<lastmod>2022-12-16T12:12:04+01:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/2022/05/10/sono-tutti-open-con-il-source-degli-altri-reprise/</loc>
<lastmod>2022-12-16T12:12:04+01:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/2022/05/24/cosa-fa-un-security-engineer-in-suse/</loc>
<lastmod>2022-12-16T12:12:04+01:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/2022/10/27/caro-diario-eccoci-qui/</loc>
<lastmod>2022-12-16T12:12:04+01:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/blog/gcc-analisi-statica-e-warning-mancanti/</loc>
<lastmod>2025-08-01T11:56:56+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/blog/programmazione-difensiva-chiudere-la-finestra-su-una-race-condition-critica/</loc>
<lastmod>2025-08-01T15:39:19+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/blog/pickle-una-bomba-ad-orologeria/</loc>
<lastmod>2025-08-10T09:46:04+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/blog/di-codemotion-e-tanto-altro/</loc>
<lastmod>2025-10-29T16:28:51+01:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/rimedi/2016-03-14-una-shell-datemi-una-shell/</loc>
<lastmod>2016-03-30T15:20:29+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/rimedi/2016-04-19-nmap-e-mysql-dalla-porta-al-dato/</loc>
<lastmod>2016-06-09T08:26:54+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/rimedi/2016-06-07-come-importare-il-certificato-del-tuo-proxy-applicativo-e-vivere-felice/</loc>
<lastmod>2016-06-09T08:26:54+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/slae/2018-05-09-assignment-1-create-a-bind-shellcode/</loc>
<lastmod>2022-12-16T11:56:19+01:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/slae/2018-05-14-assignment-2-create-a-reverse-shellcode/</loc>
<lastmod>2022-12-16T11:56:19+01:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/slae/2018-05-30-assignment-3-an-egg-hunter-journey/</loc>
<lastmod>2022-12-16T11:56:19+01:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/slae/2018-07-30-assignment-4-a-default-encoder/</loc>
<lastmod>2022-12-16T11:56:19+01:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/slae/2018-08-12-assignment-5-metasploit-shellcode-analysis/</loc>
<lastmod>2019-05-22T14:24:48+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/slae/2018-08-27-assignment-6-generate-a-polymorphic-shellcode/</loc>
<lastmod>2022-12-16T11:56:19+01:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/slae/2018-08-29-assignment-7-create-a-custom-crypter/</loc>
<lastmod>2022-12-16T11:56:19+01:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/404/</loc>
<lastmod>2019-04-25T19:23:04+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/about</loc>
<lastmod>2019-05-29T11:42:48+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/categories</loc>
<lastmod>2019-04-25T19:23:04+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/chi-sono/</loc>
<lastmod>2019-05-21T23:46:14+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/chicchi/</loc>
<lastmod>2019-04-25T19:23:04+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/contatti/</loc>
<lastmod>2023-05-05T15:29:11+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/cookie-policy/</loc>
<lastmod>2019-04-25T19:23:04+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/</loc>
<lastmod>2019-04-25T19:23:04+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/monday-blues/</loc>
<lastmod>2019-04-25T19:23:04+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/news/</loc>
<lastmod>2019-04-25T19:23:04+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/newsletter/</loc>
<lastmod>2019-05-15T17:46:35+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/opensource/</loc>
<lastmod>2019-04-25T19:23:04+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/posts/</loc>
<lastmod>2019-04-25T19:23:04+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/rimedi/</loc>
<lastmod>2019-04-25T19:23:04+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/slae/</loc>
<lastmod>2019-04-25T19:23:04+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/social/</loc>
<lastmod>2019-06-25T12:02:55+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/tags</loc>
<lastmod>2019-04-25T19:23:04+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/talks/</loc>
<lastmod>2022-12-16T11:14:31+01:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/category/attackers/</loc>
</url>
<url>
<loc>https://codiceinsicuro.it/category/pick-n-chic/</loc>
</url>
<url>
<loc>https://codiceinsicuro.it/category/builders/</loc>
</url>
<url>
<loc>https://codiceinsicuro.it/category/sicurina/</loc>
</url>
<url>
<loc>https://codiceinsicuro.it/category/meditazione/</loc>
</url>
<url>
<loc>https://codiceinsicuro.it/category/servizio/</loc>
</url>
<url>
<loc>https://codiceinsicuro.it/category/sicurina/</loc>
</url>
<url>
<loc>https://codiceinsicuro.it/category/chiacchiere-da-bar/</loc>
</url>
<url>
<loc>https://codiceinsicuro.it/category/spinaci/</loc>
</url>
<url>
<loc>https://codiceinsicuro.it/category/under-attack/</loc>
</url>
<url>
<loc>https://codiceinsicuro.it/category/l-angolo-del-libro/</loc>
</url>
<url>
<loc>https://codiceinsicuro.it/category/doctor-is-in/</loc>
</url>
<url>
<loc>https://codiceinsicuro.it/category/meditazione/</loc>
</url>
<url>
<loc>https://codiceinsicuro.it/category/under/</loc>
</url>
<url>
<loc>https://codiceinsicuro.it/category/news/</loc>
</url>
<url>
<loc>https://codiceinsicuro.it/category/chiacchiere-da-pub/</loc>
</url>
<url>
<loc>https://codiceinsicuro.it/category/post/</loc>
</url>
<url>
<loc>https://codiceinsicuro.it/category/post/</loc>
</url>
<url>
<loc>https://codiceinsicuro.it/category/getting-root/</loc>
</url>
<url>
<loc>https://codiceinsicuro.it/category/offensive/</loc>
</url>
<url>
<loc>https://codiceinsicuro.it/category/storie-dal-quotidiano/</loc>
</url>
<url>
<loc>https://codiceinsicuro.it/category/sviluppo/</loc>
</url>
<url>
<loc>https://codiceinsicuro.it/category/riflessioni/</loc>
</url>
<url>
<loc>https://codiceinsicuro.it/category/exploit-e-dintorni/</loc>
</url>
<url>
<loc>https://codiceinsicuro.it/category/progetti/</loc>
</url>
<url>
<loc>https://codiceinsicuro.it/page2/</loc>
<lastmod>2019-04-25T19:23:04+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/page3/</loc>
<lastmod>2019-04-25T19:23:04+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/page4/</loc>
<lastmod>2019-04-25T19:23:04+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/page5/</loc>
<lastmod>2019-04-25T19:23:04+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/page6/</loc>
<lastmod>2019-04-25T19:23:04+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/page7/</loc>
<lastmod>2019-04-25T19:23:04+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/page8/</loc>
<lastmod>2019-04-25T19:23:04+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/page9/</loc>
<lastmod>2019-04-25T19:23:04+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/page10/</loc>
<lastmod>2019-04-25T19:23:04+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/page11/</loc>
<lastmod>2019-04-25T19:23:04+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/page12/</loc>
<lastmod>2019-04-25T19:23:04+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/page13/</loc>
<lastmod>2019-04-25T19:23:04+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/page14/</loc>
<lastmod>2019-04-25T19:23:04+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/page15/</loc>
<lastmod>2019-04-25T19:23:04+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/page16/</loc>
<lastmod>2019-04-25T19:23:04+02:00</lastmod>
</url>
<url>
<loc>https://codiceinsicuro.it/google874dad45b05a3011.html</loc>
<lastmod>2025-01-05T19:22:41+01:00</lastmod>
</url>
</urlset>
