<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
<url>
<loc>https://g3tsyst3m.com/aboutme/Introductions/</loc>
<lastmod>2023-06-19T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://g3tsyst3m.com/privilege%20escalation/ElevationStation-part-1/</loc>
<lastmod>2023-06-22T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://g3tsyst3m.com/privilege%20escalation/ElevationStation-part-2/</loc>
<lastmod>2023-06-24T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://g3tsyst3m.com/privilege%20escalation/ElevationStation-part-3/</loc>
<lastmod>2023-06-25T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://g3tsyst3m.com/privilege%20escalation/ElevationStation-part-4/</loc>
<lastmod>2023-07-19T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://g3tsyst3m.com/threat%20hunting/Installing-Elastic-Stack-(ELK)-from-Scratch/</loc>
<lastmod>2023-08-06T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://g3tsyst3m.com/threat%20hunting/Sending-Sysmon-Logs-to-Elastic-ELK-stack/</loc>
<lastmod>2023-08-06T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://g3tsyst3m.com/threat%20hunting/Detecting-SAM-registry-hive-dumps-using-Elastic!/</loc>
<lastmod>2023-08-09T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://g3tsyst3m.com/encoding/How-to-use-Bitwise-Arithmetic-Shift-Right-Encoding-with-your-Shellcode/</loc>
<lastmod>2023-08-16T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://g3tsyst3m.com/sockets/Create-your-own-Netcat-using-Python/</loc>
<lastmod>2023-08-19T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://g3tsyst3m.com/edr%20bypass/Malware-EDR-Evasion-Techniques/</loc>
<lastmod>2023-09-27T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://g3tsyst3m.com/ntlmv2%20hashes/Getting-the-first-Foothold-Stealing-NTLMv2-hashes-with-ease/</loc>
<lastmod>2023-10-27T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://g3tsyst3m.com/privilege%20escalation/Creative-UAC-Bypass-Methods-for-the-Modern-Era/</loc>
<lastmod>2024-10-16T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://g3tsyst3m.com/shellcoding/assembly/debugging/x64-Assembly-and-Shellcoding-101/</loc>
<lastmod>2024-11-01T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://g3tsyst3m.com/shellcoding/assembly/debugging/x64-Assembly-and-Shellcoding-101-Part-2/</loc>
<lastmod>2024-11-03T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://g3tsyst3m.com/shellcoding/assembly/debugging/x64-Assembly-and-Shellcoding-101-Part-3/</loc>
<lastmod>2024-11-04T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://g3tsyst3m.com/shellcoding/assembly/debugging/x64-Assembly-and-Shellcoding-101-Part-4/</loc>
<lastmod>2024-11-06T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://g3tsyst3m.com/shellcoding/assembly/debugging/x64-Assembly-and-Shellcoding-101-Part-5/</loc>
<lastmod>2024-11-10T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://g3tsyst3m.com/shellcoding/assembly/debugging/x64-Assembly-and-Shellcoding-101-Part-6/</loc>
<lastmod>2024-11-15T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://g3tsyst3m.com/shellcoding/assembly/debugging/x64-Assembly-and-Shellcoding-101-Conclusion/</loc>
<lastmod>2024-11-17T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://g3tsyst3m.com/cve/msi/Arbitrary-Write-Privilege-Escalation-CVE-2024-50804/</loc>
<lastmod>2024-11-19T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://g3tsyst3m.com/c2/python/Create-your-own-C2-using-Python-Part-1/</loc>
<lastmod>2024-11-22T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://g3tsyst3m.com/c2/python/Create-your-own-C2-using-Python-Part-2/</loc>
<lastmod>2024-11-27T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://g3tsyst3m.com/c2/python/Create-your-own-C2-using-Python-Part-3/</loc>
<lastmod>2024-12-20T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://g3tsyst3m.com/uac%20bypass/Bypass-UAC-via-Intel-ShaderCache/</loc>
<lastmod>2025-04-22T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://g3tsyst3m.com/steganography/Steganography-is-still-relevant!/</loc>
<lastmod>2025-05-16T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://g3tsyst3m.com/binary%20exploitation/Buffer-Overflows-in-the-Modern-Era-Part-1/</loc>
<lastmod>2025-06-16T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://g3tsyst3m.com/binary%20exploitation/Buffer-Overflows-in-the-Modern-Era-Part-2/</loc>
<lastmod>2025-06-20T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://g3tsyst3m.com/binary%20exploitation/Buffer-Overflows-in-the-Modern-Era-Part-3/</loc>
<lastmod>2025-06-27T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://g3tsyst3m.com/binary%20exploitation/Buffer-Overflows-in-the-Modern-Era-Part-4/</loc>
<lastmod>2025-07-21T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://g3tsyst3m.com/binary%20exploitation/Buffer-Overflows-in-the-Modern-Era-Part-5/</loc>
<lastmod>2025-08-02T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://g3tsyst3m.com/fileless%20techniques/How-to-Create-a-Staged-In-Memory-.NET-Reflective-Shellcode-Loader/</loc>
<lastmod>2025-08-12T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://g3tsyst3m.com/fileless%20techniques/Using-Direct-Syscalls-with-an-In-Memory-PIC-Shellcode-Loader/</loc>
<lastmod>2025-08-23T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://g3tsyst3m.com/fileless%20techniques/Bypassing-EDR-using-an-In-Memory-PE-Loader/</loc>
<lastmod>2025-09-23T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://g3tsyst3m.com/process%20injection/Module-Stomping-101-My-Favorite-Stomping-Grounds/</loc>
<lastmod>2025-10-03T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://g3tsyst3m.com/shellcode/pic/Let&apos;s-Create-Some-Polymorphic-PIC-Shellcode!/</loc>
<lastmod>2025-10-19T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://g3tsyst3m.com/shellcode/pic/PIC-Shellcode-from-the-Ground-up-Part-1/</loc>
<lastmod>2025-11-05T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://g3tsyst3m.com/shellcode/pic/PIC-Shellcode-from-the-Ground-up-Part-2/</loc>
<lastmod>2025-11-25T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://g3tsyst3m.com/shellcode%20fragmentation/in-memory%20evasion/Evading-Signature-Based-Memory-Detection-Shellcode-Fragmentation-and-Staged-Reassembly/</loc>
<lastmod>2025-12-23T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://g3tsyst3m.com/lotp/Living-off-the-Process/</loc>
<lastmod>2026-01-29T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://g3tsyst3m.com/initial%20access/Gaining-Initial-Access-and-Outsmarting-SmartScreen/</loc>
<lastmod>2026-02-21T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://g3tsyst3m.com/fud/Creative-approaches-to-coding-a-FUD-Stagers/</loc>
<lastmod>2026-03-29T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://g3tsyst3m.com/about/</loc>
</url>
<url>
<loc>https://g3tsyst3m.com/categories/</loc>
</url>
<url>
<loc>https://g3tsyst3m.com/donate/</loc>
</url>
<url>
<loc>https://g3tsyst3m.com/</loc>
</url>
<url>
<loc>https://g3tsyst3m.com/news/</loc>
</url>
<url>
<loc>https://g3tsyst3m.com/sponsors/</loc>
</url>
<url>
<loc>https://g3tsyst3m.com/tags/</loc>
</url>
<url>
<loc>https://g3tsyst3m.com/page2/</loc>
</url>
<url>
<loc>https://g3tsyst3m.com/page3/</loc>
</url>
<url>
<loc>https://g3tsyst3m.com/page4/</loc>
</url>
<url>
<loc>https://g3tsyst3m.com/page5/</loc>
</url>
<url>
<loc>https://g3tsyst3m.com/page6/</loc>
</url>
<url>
<loc>https://g3tsyst3m.com/page7/</loc>
</url>
<url>
<loc>https://g3tsyst3m.com/page8/</loc>
</url>
<url>
<loc>https://g3tsyst3m.com/page9/</loc>
</url>
<url>
<loc>https://g3tsyst3m.com/_pages/google75c0188d7ffb6a56.html</loc>
<lastmod>2026-03-30T02:55:34+00:00</lastmod>
</url>
<url>
<loc>https://g3tsyst3m.com/google75c0188d7ffb6a56.html</loc>
<lastmod>2026-03-30T02:55:34+00:00</lastmod>
</url>
</urlset>
