<?xml version="1.0" encoding="utf-8" standalone="yes"?><urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml"><url><loc>https://blackwinghq.com/</loc><lastmod>2017-04-10T20:10:18-04:00</lastmod></url><url><loc>https://blackwinghq.com/blog/</loc><lastmod>2024-10-15T00:00:00+00:00</lastmod></url><url><loc>https://blackwinghq.com/categories/blackwing-intelligence/</loc><lastmod>2024-10-15T00:00:00+00:00</lastmod></url><url><loc>https://blackwinghq.com/categories/</loc><lastmod>2024-10-15T00:00:00+00:00</lastmod></url><url><loc>https://blackwinghq.com/blog/posts/finding-vulnerability-variants-at-scale/</loc><lastmod>2024-10-15T00:00:00+00:00</lastmod></url><url><loc>https://blackwinghq.com/categories/research/</loc><lastmod>2024-10-15T00:00:00+00:00</lastmod></url><url><loc>https://blackwinghq.com/tags/</loc><lastmod>2024-10-15T00:00:00+00:00</lastmod></url><url><loc>https://blackwinghq.com/tags/variant-analysis/</loc><lastmod>2024-10-15T00:00:00+00:00</lastmod></url><url><loc>https://blackwinghq.com/tags/vulnerability-research/</loc><lastmod>2024-10-15T00:00:00+00:00</lastmod></url><url><loc>https://blackwinghq.com/categories/blackwing-labs/</loc><lastmod>2024-01-02T00:00:00+00:00</lastmod></url><url><loc>https://blackwinghq.com/tags/heap/</loc><lastmod>2024-01-02T00:00:00+00:00</lastmod></url><url><loc>https://blackwinghq.com/blog/posts/playing-with-libmalloc/</loc><lastmod>2024-01-02T00:00:00+00:00</lastmod></url><url><loc>https://blackwinghq.com/tags/reverse-engineering/</loc><lastmod>2024-01-02T00:00:00+00:00</lastmod></url><url><loc>https://blackwinghq.com/tags/tools/</loc><lastmod>2024-01-02T00:00:00+00:00</lastmod></url><url><loc>https://blackwinghq.com/blog/posts/a-touch-of-pwn-part-i/</loc><lastmod>2023-11-21T00:00:00+00:00</lastmod></url><url><loc>https://blackwinghq.com/tags/cryptography/</loc><lastmod>2023-11-21T00:00:00+00:00</lastmod></url><url><loc>https://blackwinghq.com/tags/exploit-development/</loc><lastmod>2023-11-21T00:00:00+00:00</lastmod></url><url><loc>https://blackwinghq.com/privacy/</loc><lastmod>2017-04-10T20:10:18-04:00</lastmod></url><url><loc>https://blackwinghq.com/about/</loc><lastmod>2017-04-10T20:10:18-04:00</lastmod></url><url><loc>https://blackwinghq.com/contact/</loc><lastmod>2017-04-10T20:10:18-04:00</lastmod></url><url><loc>https://blackwinghq.com/labs/</loc><lastmod>2017-04-10T20:10:18-04:00</lastmod></url><url><loc>https://blackwinghq.com/services/</loc><lastmod>2017-04-10T20:10:18-04:00</lastmod></url><url><loc>https://blackwinghq.com/blog/posts/dissecting-cve-2013-1899/</loc><lastmod>2013-08-04T00:00:00+00:00</lastmod></url><url><loc>https://blackwinghq.com/tags/exploits/</loc><lastmod>2013-08-04T00:00:00+00:00</lastmod></url><url><loc>https://blackwinghq.com/tags/postgresql/</loc><lastmod>2013-08-04T00:00:00+00:00</lastmod></url><url><loc>https://blackwinghq.com/tags/rce/</loc><lastmod>2013-08-04T00:00:00+00:00</lastmod></url><url><loc>https://blackwinghq.com/services/reverse_engineering/</loc></url><url><loc>https://blackwinghq.com/services/security-analysis/</loc></url><url><loc>https://blackwinghq.com/services/security-engineering-architecture/</loc></url></urlset>