<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="wordpress.com" -->
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd"><url><loc>https://deadhacker.com/2010/02/03/jtag-enumeration/</loc><lastmod>2023-01-31T15:25:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://deadhacker.com/2009/07/26/targeting-the-panasonic-hvx200-hd-camera/</loc><image:image><image:loc>https://deadhacker.com/wp-content/uploads/2009/07/2305925267_96278907701.jpg</image:loc><image:title>Panasonic HVX200</image:title><image:caption>photo by Clint McManaman</image:caption></image:image><image:image><image:loc>https://deadhacker.com/wp-content/uploads/2009/07/picture-21.png</image:loc><image:title>HVX200 CramFS directory structure</image:title></image:image><image:image><image:loc>https://deadhacker.com/wp-content/uploads/2009/07/2305925267_9627890770.jpg</image:loc><image:title>Panasonic HVX200</image:title><image:caption>photo by Clint McManaman</image:caption></image:image><image:image><image:loc>https://deadhacker.com/wp-content/uploads/2009/07/picture-2.png</image:loc><image:title>HVX200 CramFS directory structure</image:title></image:image><image:image><image:loc>https://deadhacker.com/wp-content/uploads/2009/07/picture-1.png</image:loc><image:title>HVX200_RomFS_hex</image:title></image:image><lastmod>2023-01-31T15:16:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://deadhacker.com/2011/03/13/predicting-location-of-one-hop-proxy-users/</loc><lastmod>2023-01-31T15:01:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://deadhacker.com/2012/06/08/backdoor-silicon-fud/</loc><lastmod>2023-01-31T15:01:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://deadhacker.com/2015/04/08/embedded-analysis-ccc-wiki/</loc><image:image><image:loc>https://deadhacker.com/wp-content/uploads/2015/04/mg_8990.jpg</image:loc><image:title>MG_8990</image:title></image:image><lastmod>2023-01-31T14:59:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://deadhacker.com/2016/03/25/the-terrorists-phone/</loc><image:image><image:loc>https://deadhacker.com/wp-content/uploads/2016/03/selection_022.png</image:loc><image:title>Selection_022</image:title></image:image><lastmod>2023-01-31T14:58:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://deadhacker.com/2018/10/07/the-chinese-backdoor-that-isnt/</loc><image:image><image:loc>https://deadhacker.com/wp-content/uploads/2018/10/peek-2018-10-07-12-50.gif</image:loc><image:title>Peek 2018-10-07 12-50</image:title></image:image><image:image><image:loc>https://deadhacker.com/wp-content/uploads/2018/10/peek-2018-10-07-12-47.gif</image:loc><image:title>Peek 2018-10-07 12-47</image:title></image:image><lastmod>2023-01-31T14:39:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://deadhacker.com/2010/03/25/bincrowd-communal-reverse-engineering-framwork/</loc><image:image><image:loc>https://deadhacker.com/wp-content/uploads/2010/03/picture-3.png</image:loc><image:title>ShaREing is caring</image:title><image:caption>From Zynamics BinCrowd presentation</image:caption></image:image><lastmod>2023-01-31T14:29:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://deadhacker.com/about/</loc><image:image><image:loc>https://deadhacker.com/wp-content/uploads/2006/02/mme.jpg</image:loc><image:title>mme.jpg</image:title></image:image><image:image><image:loc>https://deadhacker.com/wp-content/uploads/2006/02/me.jpg</image:loc><image:title>me.jpg</image:title></image:image><image:image><image:loc>https://deadhacker.com/wp-content/uploads/2006/02/me_.jpg</image:loc><image:title>me_.jpg</image:title></image:image><image:image><image:loc>https://deadhacker.com/wp-content/uploads/2006/02/me3.jpg</image:loc><image:title>me3.jpg</image:title></image:image><image:image><image:loc>https://deadhacker.com/wp-content/uploads/2006/02/84001187_e8eb925017.jpg</image:loc><image:title>84001187_e8eb925017.jpg</image:title></image:image><image:image><image:loc>https://deadhacker.com/wp-content/uploads/2006/02/84001220_734db03e04.jpg</image:loc><image:title>84001220_734db03e04.jpg</image:title></image:image><lastmod>2022-04-26T13:40:10+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://deadhacker.com/2007/05/13/finding-entropy-in-binary-files/</loc><image:image><image:loc>https://deadhacker.com/wp-content/uploads/2007/05/example.png</image:loc><image:title>example.png</image:title></image:image><lastmod>2022-04-26T13:29:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://deadhacker.com/2010/12/12/speaking-at-27c3-in-berlin-dec-27-30/</loc><lastmod>2022-04-26T13:28:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://deadhacker.com/contact/</loc><lastmod>2022-04-26T10:30:49+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://deadhacker.com/tools/</loc><lastmod>2025-02-20T22:36:18+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://deadhacker.com/2011/06/16/speaking-at-recon-in-montreal-jul-8-10/</loc><image:image><image:loc>https://deadhacker.com/wp-content/uploads/2011/06/2011_hfuhrmann_cast-1.jpg</image:loc><image:title>cast</image:title></image:image><image:image><image:loc>https://deadhacker.com/wp-content/uploads/2011/06/mg_8336.jpg</image:loc><image:title>_MG_8336</image:title></image:image><lastmod>2016-09-30T10:37:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://deadhacker.com/2012/08/07/speaking-at-ecrypt-in-bochum-sep-3-7/</loc><lastmod>2013-07-02T03:00:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://deadhacker.com/2008/05/06/the-subterfugue-process-sandbox/</loc><lastmod>2024-10-17T03:57:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://deadhacker.com/2010/09/17/speaking-at-0sec-in-berne-oct-15-17/</loc><lastmod>2011-10-02T21:08:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://deadhacker.com/2011/04/21/embedded-analysis-workshop-berlin-may-1226/</loc><image:image><image:loc>https://deadhacker.com/wp-content/uploads/2011/04/photo-108.jpg</image:loc><image:title>Arduino Mold</image:title></image:image><lastmod>2011-06-16T21:36:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://deadhacker.com/2006/02/21/sha-1-illustrated/</loc><image:image><image:loc>https://deadhacker.com/wp-content/uploads/2006/02/overview.png</image:loc><image:title>sha-1 general process overview</image:title></image:image><image:image><image:loc>https://deadhacker.com/wp-content/uploads/2006/02/expand_anim.gif</image:loc><image:title>Animation of block expansion</image:title></image:image><image:image><image:loc>https://deadhacker.com/wp-content/uploads/2006/02/return_hash.png</image:loc><image:title>return hash state as hash</image:title></image:image><image:image><image:loc>https://deadhacker.com/wp-content/uploads/2006/02/next.png</image:loc><image:title>repeat for next block</image:title></image:image><image:image><image:loc>https://deadhacker.com/wp-content/uploads/2006/02/compress_chunks.png</image:loc><image:title>compress block into hash state</image:title></image:image><image:image><image:loc>https://deadhacker.com/wp-content/uploads/2006/02/block_expland.png</image:loc><image:title>expand block to 80 32 bit chunks</image:title></image:image><image:image><image:loc>https://deadhacker.com/wp-content/uploads/2006/02/message_blocks.png</image:loc><image:title>message blocks</image:title></image:image><image:image><image:loc>https://deadhacker.com/wp-content/uploads/2006/02/message.png</image:loc><image:title>message</image:title></image:image><lastmod>2011-05-06T09:44:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://deadhacker.com/2006/02/02/introduction-to-fpgacpldpld/</loc><lastmod>2010-09-26T00:54:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://deadhacker.com/2009/11/08/workflow-for-hardware-security-analysis/</loc><lastmod>2010-01-15T10:45:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://deadhacker.com/2006/01/22/paper-bugger-the-debugger/</loc><lastmod>2008-10-24T17:52:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://deadhacker.com/2006/02/06/an-illustrated-guide-to-cryptographic-hashes-intro/</loc><lastmod>2008-10-24T17:41:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://deadhacker.com/2006/02/22/formal-aspects-of-mobile-code-security-chapter-5/</loc><lastmod>2023-02-17T13:42:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://deadhacker.com/2006/02/01/herding-hash-functions/</loc><lastmod>2006-02-22T10:11:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://deadhacker.com/2006/02/05/vb-reverse-a-decompiling-approach/</loc><lastmod>2006-02-21T19:47:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://deadhacker.com</loc><changefreq>daily</changefreq><priority>1.0</priority><lastmod>2025-02-20T22:36:18+00:00</lastmod></url></urlset>
