<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml">
<url>
  <loc>https://www.synacktiv.com/</loc>
  <xhtml:link href="https://www.synacktiv.com/en.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/la-societe.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/the-company.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/la-societe.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/le-lab.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/the-lab.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/le-lab.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/azure-devops-build-agent-analysis.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/azure-devops-build-agent-analysis.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/azure-devops-build-agent-analysis.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/pwning-an-outdated-kibana-with-not-so-sad-vulnerabilities.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/pwning-an-outdated-kibana-with-not-so-sad-vulnerabilities.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/pwning-an-outdated-kibana-with-not-so-sad-vulnerabilities.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/battle-of-the-parsers-peg-vs-combinators.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/battle-of-the-parsers-peg-vs-combinators.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/battle-of-the-parsers-peg-vs-combinators.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/using-veeam-metadata-for-efficient-extraction-of-backup-artefacts-23.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/using-veeam-metadata-for-efficient-extraction-of-backup-artefacts-23.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/using-veeam-metadata-for-efficient-extraction-of-backup-artefacts-23.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/rulesfinder-automatically-create-good-password-cracking-rulesets.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/rulesfinder-automatically-create-good-password-cracking-rulesets.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/rulesfinder-automatically-create-good-password-cracking-rulesets.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/quantum-readiness-hash-based-signatures.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/quantum-readiness-hash-based-signatures.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/quantum-readiness-hash-based-signatures.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/github-actions-exploitation-dependabot.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/github-actions-exploitation-dependabot.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/github-actions-exploitation-dependabot.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/sccmsecretspy-exploiting-sccm-policies-distribution-for-credentials-harvesting-initial.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/sccmsecretspy-exploiting-sccm-policies-distribution-for-credentials-harvesting-initial.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/sccmsecretspy-exploiting-sccm-policies-distribution-for-credentials-harvesting-initial.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/2018-summer-challenge-metrocross.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/2018-summer-challenge-metrocross.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/2018-summer-challenge-metrocross.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/lapsus-is-dead-long-live-hexalocker.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/lapsus-is-dead-long-live-hexalocker.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/lapsus-is-dead-long-live-hexalocker.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/forensic-analysis-of-bitwarden-self-hosted-server.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/forensic-analysis-of-bitwarden-self-hosted-server.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/forensic-analysis-of-bitwarden-self-hosted-server.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/2018-summer-challenge-writeup.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/2018-summer-challenge-writeup.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/2018-summer-challenge-writeup.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/diving-into-adb-protocol-internals-12.html</loc>
  <xhtml:link href="https://www.synacktiv.com/publications/diving-into-adb-protocol-internals-12.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/diving-into-adb-protocol-internals-12.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/defend-against-vampires-with-10-gbps-network-encryption.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/defend-against-vampires-with-10-gbps-network-encryption.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/defend-against-vampires-with-10-gbps-network-encryption.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/politique-de-gestion-des-cookies.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/privacy-policy.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/politique-de-gestion-des-cookies.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/2019-summer-challenge-alonzo.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/2019-summer-challenge-alonzo.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/2019-summer-challenge-alonzo.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/stage-recherche-et-exploitation-de-vulnerabilites.html</loc>
  <xhtml:link href="https://www.synacktiv.com/stage-recherche-et-exploitation-de-vulnerabilites.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/stage-recherche-et-exploitation-de-vulnerabilites.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/exploiting-a-blind-format-string-vulnerability-in-modern-binaries-a-case-study-from.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/exploiting-a-blind-format-string-vulnerability-in-modern-binaries-a-case-study-from.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/exploiting-a-blind-format-string-vulnerability-in-modern-binaries-a-case-study-from.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/hook-me-if-you-can.html</loc>
  <xhtml:link href="https://www.synacktiv.com/hook-me-if-you-can.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/hook-me-if-you-can.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/2019-summer-challenge-writeup.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/2019-summer-challenge-writeup.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/2019-summer-challenge-writeup.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/relaying-kerberos-over-smb-using-krbrelayx.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/relaying-kerberos-over-smb-using-krbrelayx.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/relaying-kerberos-over-smb-using-krbrelayx.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/automated-network-security-with-rust-detecting-and-blocking-port-scanners.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/automated-network-security-with-rust-detecting-and-blocking-port-scanners.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/automated-network-security-with-rust-detecting-and-blocking-port-scanners.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/fic2020-prequals-ctf-write-up.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/fic2020-prequals-ctf-write-up.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/fic2020-prequals-ctf-write-up.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/advent-ctf-2019-overthewire-day2-writeup.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/advent-ctf-2019-overthewire-day2-writeup.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/advent-ctf-2019-overthewire-day2-writeup.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/diving-into-adb-protocol-internals-22.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/diving-into-adb-protocol-internals-22.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/diving-into-adb-protocol-internals-22.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/politique-de-confidentialite-relative-au-recrutement.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/politique-de-confidentialite-relative-au-recrutement.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/politique-de-confidentialite-relative-au-recrutement.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/etude-de-cas-comment-hunters-international-et-ses-affilies-ciblent-vos-hyperviseurs.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/case-study-how-hunters-international-and-friends-target-your-hypervisors.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/etude-de-cas-comment-hunters-international-et-ses-affilies-ciblent-vos-hyperviseurs.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/abusing-multicast-poisoning-for-pre-authenticated-kerberos-relay-over-http-with.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/abusing-multicast-poisoning-for-pre-authenticated-kerberos-relay-over-http-with.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/abusing-multicast-poisoning-for-pre-authenticated-kerberos-relay-over-http-with.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/sharkyctf-ezdump-writeups-linux-forensics-introduction.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/sharkyctf-ezdump-writeups-linux-forensics-introduction.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/sharkyctf-ezdump-writeups-linux-forensics-introduction.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/offres/formations/ransomware-investigation.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/offers/trainings/ransomware-investigation.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/offres/formations/ransomware-investigation.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/lsa-secrets-revisiting-secretsdump.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/lsa-secrets-revisiting-secretsdump.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/lsa-secrets-revisiting-secretsdump.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/exploiting-heroes-of-might-and-magic-v.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/exploiting-heroes-of-might-and-magic-v.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/exploiting-heroes-of-might-and-magic-v.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/outils-open-source-des-attaquants-exploitant-ivanti-csa.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/open-source-toolset-of-an-ivanti-csa-attacker.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/outils-open-source-des-attaquants-exploitant-ivanti-csa.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/taking-the-relaying-capabilities-of-multicast-poisoning-to-the-next-level-tricking.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/taking-the-relaying-capabilities-of-multicast-poisoning-to-the-next-level-tricking.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/taking-the-relaying-capabilities-of-multicast-poisoning-to-the-next-level-tricking.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/coldfusion-cfmx_compat-lolcryption.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/coldfusion-cfmx_compat-lolcryption.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/coldfusion-cfmx_compat-lolcryption.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/exploiting-neverwinter-nights.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/exploiting-neverwinter-nights.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/exploiting-neverwinter-nights.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/livewire-execution-de-commandes-a-distance-via-unmarshaling.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/livewire-remote-command-execution-through-unmarshaling.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/livewire-execution-de-commandes-a-distance-via-unmarshaling.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/cve-2025-23016-exploiter-la-bibliotheque-fastcgi.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/cve-2025-23016-exploiting-the-fastcgi-library.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/cve-2025-23016-exploiter-la-bibliotheque-fastcgi.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/analyse-dun-decodeur-tnt.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/hack-the-channel-a-deep-dive-into-dvb-receiver-security.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/analyse-dun-decodeur-tnt.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/practical-dma-attack-on-windows-10.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/practical-dma-attack-on-windows-10.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/practical-dma-attack-on-windows-10.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/dissecting-dcom-partie-1.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/dissecting-dcom-part-1.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/dissecting-dcom-partie-1.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/ios-184-dlsym-considered-harmful.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/ios-184-dlsym-considered-harmful.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/ios-184-dlsym-considered-harmful.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/no-grave-but-the-sip-reversing-a-voip-phone-firmware.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/no-grave-but-the-sip-reversing-a-voip-phone-firmware.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/no-grave-but-the-sip-reversing-a-voip-phone-firmware.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/extraction-des-archives-chiffrees-synology-pwn2own-irlande-2024.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/extraction-of-synology-encrypted-archives-pwn2own-ireland-2024.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/extraction-des-archives-chiffrees-synology-pwn2own-irlande-2024.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/attaque-du-tesla-wall-connector-depuis-le-port-de-charge.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/exploiting-the-tesla-wall-connector-from-its-charge-port-connector.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/attaque-du-tesla-wall-connector-depuis-le-port-de-charge.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/from-cheap-iot-toy-to-your-smartphone-getting-rce-by-leveraging-a-companion-app.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/from-cheap-iot-toy-to-your-smartphone-getting-rce-by-leveraging-a-companion-app.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/from-cheap-iot-toy-to-your-smartphone-getting-rce-by-leveraging-a-companion-app.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/e-ink-maiden-bring-your-reader-to-the-reverser.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/e-ink-maiden-bring-your-reader-to-the-reverser.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/e-ink-maiden-bring-your-reader-to-the-reverser.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/laravel-analyse-de-fuite-dappkey.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/laravel-appkey-leakage-analysis.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/laravel-analyse-de-fuite-dappkey.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/lextension-fantome-infiltrer-chrome-par-des-voies-inexplorees.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/the-phantom-extension-backdooring-chrome-through-uncharted-pathways.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/lextension-fantome-infiltrer-chrome-par-des-voies-inexplorees.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/la-reflexion-ntlm-est-morte-vive-la-reflexion-ntlm-analyse-approfondie-de-la-cve-2025.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/ntlm-reflection-is-dead-long-live-ntlm-reflection-an-in-depth-analysis-of-cve-2025.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/la-reflexion-ntlm-est-morte-vive-la-reflexion-ntlm-analyse-approfondie-de-la-cve-2025.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/paint-it-blue-attacking-the-bluetooth-stack.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/paint-it-blue-attacking-the-bluetooth-stack.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/paint-it-blue-attacking-the-bluetooth-stack.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/hunting-mobile-devices-endpoints-the-rf-and-the-hard-way.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/hunting-mobile-devices-endpoints-the-rf-and-the-hard-way.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/hunting-mobile-devices-endpoints-the-rf-and-the-hard-way.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/offres/formations/azure-intrusion-tactics.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/offers/trainings/azure-intrusion-tactics.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/offres/formations/azure-intrusion-tactics.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/binder-secctx-patch-analysis.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/binder-secctx-patch-analysis.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/binder-secctx-patch-analysis.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/icmp-reachable.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/icmp-reachable.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/icmp-reachable.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/binder-transactions-in-the-bowels-of-the-linux-kernel.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/binder-transactions-in-the-bowels-of-the-linux-kernel.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/binder-transactions-in-the-bowels-of-the-linux-kernel.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/breaking-namespace-isolation-with-pf_ring-before-700.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/breaking-namespace-isolation-with-pf_ring-before-700.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/breaking-namespace-isolation-with-pf_ring-before-700.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/let-me-cook-you-a-vulnerability-exploitation-du-thermomix-tm5.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/let-me-cook-you-a-vulnerability-exploiting-the-thermomix-tm5.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/let-me-cook-you-a-vulnerability-exploitation-du-thermomix-tm5.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/rce-vulnerability-in-hp-ilo.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/rce-vulnerability-in-hp-ilo.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/rce-vulnerability-in-hp-ilo.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/appledbrs-un-outil-daide-a-la-recherche-sur-plateformes-apple.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/appledbrs-a-research-support-tool-for-apple-platforms.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/appledbrs-un-outil-daide-a-la-recherche-sur-plateformes-apple.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/lightspeed-a-race-for-an-iosmacos-sandbox-escape.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/lightspeed-a-race-for-an-iosmacos-sandbox-escape.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/lightspeed-a-race-for-an-iosmacos-sandbox-escape.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/2025-summer-challenge-ocinception.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/2025-summer-challenge-ocinception.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/2025-summer-challenge-ocinception.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/exploring-grapheneos-secure-allocator-hardened-malloc.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/exploring-grapheneos-secure-allocator-hardened-malloc.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/exploring-grapheneos-secure-allocator-hardened-malloc.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/que-pourrait-il-arriver-de-dangereux-lorsque-le-mode-sql-strict-de-mysql-est-desactive.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/what-could-go-wrong-when-mysql-strict-sql-mode-is-off.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/que-pourrait-il-arriver-de-dangereux-lorsque-le-mode-sql-strict-de-mysql-est-desactive.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/ios12-kernelcache-laundering.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/ios12-kernelcache-laundering.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/ios12-kernelcache-laundering.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/faut-il-faire-confiance-au-zero-trust-contourner-les-controles-de-posture-zscaler.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/should-you-trust-your-zero-trust-bypassing-zscaler-posture-checks.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/faut-il-faire-confiance-au-zero-trust-contourner-les-controles-de-posture-zscaler.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/exploiting-anno-1404.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/exploiting-anno-1404.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/exploiting-anno-1404.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/netdata-appsplugin-security-fixes.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/netdata-appsplugin-security-fixes.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/netdata-appsplugin-security-fixes.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/linkpro-analyse-dun-rootkit-ebpf.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/linkpro-ebpf-rootkit-analysis.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/linkpro-analyse-dun-rootkit-ebpf.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/hp-ilo-talk-at-recon-brx-2018.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/hp-ilo-talk-at-recon-brx-2018.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/hp-ilo-talk-at-recon-brx-2018.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/transition-post-quantique-lhybridation-des-signatures.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/quantum-readiness-hybridizing-signatures.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/transition-post-quantique-lhybridation-des-signatures.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/transition-post-quantique-lhybridation-des-echanges-de-cles.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/quantum-readiness-hybridizing-key-exchanges.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/transition-post-quantique-lhybridation-des-echanges-de-cles.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/2025-summer-challenge-writeup.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/2025-summer-challenge-writeup.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/2025-summer-challenge-writeup.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/activid-administrator-account-takeover-the-story-behind-hid-psa-2025-002.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/activid-administrator-account-takeover-the-story-behind-hid-psa-2025-002.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/activid-administrator-account-takeover-the-story-behind-hid-psa-2025-002.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/kinibi-tee-trusted-application-exploitation.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/kinibi-tee-trusted-application-exploitation.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/kinibi-tee-trusted-application-exploitation.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/offres/formations/embedded-systems-exploitation.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/offers/trainings/embedded-systems-exploitation.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/offres/formations/embedded-systems-exploitation.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/llm-poisoning-13-lire-les-pensees-dun-transformer.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/llm-poisoning-13-reading-the-transformers-thoughts.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/llm-poisoning-13-lire-les-pensees-dun-transformer.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/dataforge-system.html</loc>
  <xhtml:link href="https://www.synacktiv.com/dataforge-system.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/dataforge-system.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/deep-purple-enrichissement-de-larsenal-purple-team.html</loc>
  <xhtml:link href="https://www.synacktiv.com/deep-purple-enrichissement-de-larsenal-purple-team.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/deep-purple-enrichissement-de-larsenal-purple-team.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/blue-skies-arsenal-daudit-azure-et-microsoft-365.html</loc>
  <xhtml:link href="https://www.synacktiv.com/blue-skies-arsenal-daudit-azure-et-microsoft-365.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/blue-skies-arsenal-daudit-azure-et-microsoft-365.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/die-hardening-audit-de-configuration-windows-et-linux.html</loc>
  <xhtml:link href="https://www.synacktiv.com/die-hardening-audit-de-configuration-windows-et-linux.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/die-hardening-audit-de-configuration-windows-et-linux.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/fast-curious-automatisation-de-scans-a-grande-echelle.html</loc>
  <xhtml:link href="https://www.synacktiv.com/fast-curious-automatisation-de-scans-a-grande-echelle.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/fast-curious-automatisation-de-scans-a-grande-echelle.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/code-checkmate-in-smm.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/code-checkmate-in-smm.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/code-checkmate-in-smm.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/offres/formations/cloud-forensics-in-azure.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/offers/trainings/cloud-forensics-in-azure.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/offres/formations/cloud-forensics-in-azure.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/offres/formations/cloud-forensics-in-aws.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/offers/trainings/cloud-forensics-in-aws.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/offres/formations/cloud-forensics-in-aws.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/construire-un-binaire-rust-two-face-pour-linux.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/creating-a-two-face-rust-binary-on-linux.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/construire-un-binaire-rust-two-face-pour-linux.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/offres/formations/kubernetes-intrusion-tactics.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/offers/trainings/kubernetes-intrusion-tactics.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/offres/formations/kubernetes-intrusion-tactics.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/offres/formations/aws-intrusion-tactics.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/offers/trainings/aws-intrusion-tactics.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/offres/formations/aws-intrusion-tactics.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/site-unseen-enumerer-et-attaquer-les-sites-active-directory.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/site-unseen-enumerating-and-attacking-active-directory-sites.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/site-unseen-enumerer-et-attaquer-les-sites-active-directory.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/using-your-bmc-as-a-dma-device-plugging-pcileech-to-hpe-ilo-4.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/using-your-bmc-as-a-dma-device-plugging-pcileech-to-hpe-ilo-4.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/using-your-bmc-as-a-dma-device-plugging-pcileech-to-hpe-ilo-4.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/exploiting-a-no-name-freebsd-kernel-vulnerability.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/exploiting-a-no-name-freebsd-kernel-vulnerability.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/exploiting-a-no-name-freebsd-kernel-vulnerability.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/recycle-rex-enhancement-of-the-password-recycling-feature-in-kraqozorus.html</loc>
  <xhtml:link href="https://www.synacktiv.com/recycle-rex-enhancement-of-the-password-recycling-feature-in-kraqozorus.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/recycle-rex-enhancement-of-the-password-recycling-feature-in-kraqozorus.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/2025-winter-challenge-quinindrome.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/2025-winter-challenge-quinindrome.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/2025-winter-challenge-quinindrome.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/bfs-2019-exploitation-challenge.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/bfs-2019-exploitation-challenge.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/bfs-2019-exploitation-challenge.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/wireless-infidelity-pentest-wi-fi-en-2025.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/wireless-infidelity-pentesting-wi-fi-in-2025.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/wireless-infidelity-pentest-wi-fi-en-2025.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/breaking-the-beestation-inside-our-pwn2own-2025-exploit-journey.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/breaking-the-beestation-inside-our-pwn2own-2025-exploit-journey.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/breaking-the-beestation-inside-our-pwn2own-2025-exploit-journey.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/offres/formations/advanced-malware-analysis.html</loc>
  <xhtml:link href="https://www.synacktiv.com/offres/formations/advanced-malware-analysis.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/offres/formations/advanced-malware-analysis.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/offres/formations/attacking-web-applications.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/offers/trainings/attacking-web-applications.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/offres/formations/attacking-web-applications.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/scraps-of-notes-on-exploiting-exim-vulnerabilities.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/scraps-of-notes-on-exploiting-exim-vulnerabilities.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/scraps-of-notes-on-exploiting-exim-vulnerabilities.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/on-the-clock-escaping-vmware-workstation-at-pwn2own-berlin-2025.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/on-the-clock-escaping-vmware-workstation-at-pwn2own-berlin-2025.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/on-the-clock-escaping-vmware-workstation-at-pwn2own-berlin-2025.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/au-dela-des-acl-cartographier-les-chemins-delevation-de-privileges-windows-avec.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/beyond-acls-mapping-windows-privilege-escalation-paths-with-bloodhound.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/au-dela-des-acl-cartographier-les-chemins-delevation-de-privileges-windows-avec.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/through-the-smm-class-and-a-vulnerability-found-there.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/through-the-smm-class-and-a-vulnerability-found-there.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/through-the-smm-class-and-a-vulnerability-found-there.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/2025-winter-challenge-writeup.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/2025-winter-challenge-writeup.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/2025-winter-challenge-writeup.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/developpeur-ia-agentique-oriente-securite.html</loc>
  <xhtml:link href="https://www.synacktiv.com/developpeur-ia-agentique-oriente-securite.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/developpeur-ia-agentique-oriente-securite.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/ingenieur-avant-vente-mobile-eu.html</loc>
  <xhtml:link href="https://www.synacktiv.com/ingenieur-avant-vente-mobile-eu.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/ingenieur-avant-vente-mobile-eu.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/exploiter-la-rbcd-en-environnements-cross-domain-cross-forest.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/exploring-cross-domain-cross-forest-rbcd.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/exploiter-la-rbcd-en-environnements-cross-domain-cross-forest.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/mitmproxy-for-fun-and-profit-interception-et-analyse-de-flux-applicatifs.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/mitmproxy-for-fun-and-profit-interception-and-analysis-of-application-traffic.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/mitmproxy-for-fun-and-profit-interception-et-analyse-de-flux-applicatifs.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/grand-saut-dans-le-deploiement-sur-site-dun-serveur-llm-a-moindres-privileges.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/deep-dive-into-the-deployment-of-an-on-premise-low-privileged-llm-server.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/grand-saut-dans-le-deploiement-sur-site-dun-serveur-llm-a-moindres-privileges.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/binder-analysis-and-exploitation-of-cve-2020-0041.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/binder-analysis-and-exploitation-of-cve-2020-0041.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/binder-analysis-and-exploitation-of-cve-2020-0041.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/kubernetes-forensics-13-what-the-container.html</loc>
  <xhtml:link href="https://www.synacktiv.com/publications/kubernetes-forensics-13-what-the-container.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/kubernetes-forensics-13-what-the-container.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/offres/formations/kubernetes-forensics.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/offers/trainings/kubernetes-forensics.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/offres/formations/kubernetes-forensics.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/offres/formations/agentic-ai-red-teaming.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/offers/trainings/agentic-ai-red-teaming.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/offres/formations/agentic-ai-red-teaming.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/offres/formations/network-interception-in-rust.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/offers/trainings/network-interception-in-rust.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/offres/formations/network-interception-in-rust.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/offres/formations/advanced-rust.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/offers/trainings/advanced-rust.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/offres/formations/advanced-rust.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/im-smbghost-daba-dee-daba-da.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/im-smbghost-daba-dee-daba-da.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/im-smbghost-daba-dee-daba-da.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/memory-leak-and-use-after-free-in-squid.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/memory-leak-and-use-after-free-in-squid.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/memory-leak-and-use-after-free-in-squid.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/return-of-the-ios-sandbox-escape-lightspeeds-back-in-the-race.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/return-of-the-ios-sandbox-escape-lightspeeds-back-in-the-race.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/return-of-the-ios-sandbox-escape-lightspeeds-back-in-the-race.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/grehack-2018-qualification-challenge.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/grehack-2018-qualification-challenge.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/grehack-2018-qualification-challenge.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/a-journey-in-reversing-uefi-lenovo-passwords-management.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/a-journey-in-reversing-uefi-lenovo-passwords-management.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/a-journey-in-reversing-uefi-lenovo-passwords-management.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/the-fix-for-cve-2020-9859-and-the-lightspeed-vulnerability.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/the-fix-for-cve-2020-9859-and-the-lightspeed-vulnerability.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/the-fix-for-cve-2020-9859-and-the-lightspeed-vulnerability.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/nous-rejoindre.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/join-us.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/nous-rejoindre.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/prestations/test-dintrusionred-team.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/features/penetration-test-red-team.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/prestations/test-dintrusionred-team.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/produits/houdini.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/products/houdini.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/produits/houdini.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/produits/disconet.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/products/disconet.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/produits/disconet.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/produits/oursin.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/produits/oursin.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/produits/oursin.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/produits/leakozorus.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/products/leakozorus.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/produits/leakozorus.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/prestations/audit-de-securite.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/features/security-audit.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/prestations/audit-de-securite.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/prestations/reverse-engineering.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/features/reverse-engineering.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/prestations/reverse-engineering.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/prestations/developpement.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/features/development.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/prestations/developpement.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/izi-izi-pwn2own-ics-miami.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/izi-izi-pwn2own-ics-miami.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/izi-izi-pwn2own-ics-miami.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/mentions-legales.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/legal-notice.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/mentions-legales.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/dji-android-go-4-application-security-analysis.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/dji-android-go-4-application-security-analysis.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/dji-android-go-4-application-security-analysis.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/dji-pilot-android-application-security-analysis-0.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/dji-pilot-android-application-security-analysis-1.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/dji-pilot-android-application-security-analysis-0.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/treasure-chest-party-quest-from-doom-to-exploit.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/treasure-chest-party-quest-from-doom-to-exploit.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/treasure-chest-party-quest-from-doom-to-exploit.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/cisco-ise-15-passwords-decryption.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/cisco-ise-15-passwords-decryption.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/cisco-ise-15-passwords-decryption.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/ubuntu-ppps-cve-2020-15704-wrap-up.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/ubuntu-ppps-cve-2020-15704-wrap-up.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/ubuntu-ppps-cve-2020-15704-wrap-up.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/bypassing-naxsi-filtering-engine.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/bypassing-naxsi-filtering-engine.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/bypassing-naxsi-filtering-engine.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/this-is-for-the-pwners-exploiting-a-webkit-0-day-in-playstation-4.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/this-is-for-the-pwners-exploiting-a-webkit-0-day-in-playstation-4.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/this-is-for-the-pwners-exploiting-a-webkit-0-day-in-playstation-4.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/ios-1-day-hunting-uncovering-and-exploiting-cve-2020-27950-kernel-memory-leak.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/ios-1-day-hunting-uncovering-and-exploiting-cve-2020-27950-kernel-memory-leak.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/ios-1-day-hunting-uncovering-and-exploiting-cve-2020-27950-kernel-memory-leak.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/dont-fear-the-bark-tsrewrite-to-dodge-the-mark.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/dont-fear-the-bark-tsrewrite-to-dodge-the-mark.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/dont-fear-the-bark-tsrewrite-to-dodge-the-mark.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/pull-up-your-bootloader.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/pull-up-your-bootloader.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/pull-up-your-bootloader.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/pwn2own-tokyo-2020-defeating-the-tp-link-ac1750.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/pwn2own-tokyo-2020-defeating-the-tp-link-ac1750.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/pwn2own-tokyo-2020-defeating-the-tp-link-ac1750.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/unleash-the-dino-time-based-strategies-to-improve-password-cracking.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/unleash-the-dino-time-based-strategies-to-improve-password-cracking.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/unleash-the-dino-time-based-strategies-to-improve-password-cracking.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/investigating-ida-lumina-feature.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/investigating-ida-lumina-feature.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/investigating-ida-lumina-feature.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/typo3-leak-to-remote-code-execution.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/typo3-leak-to-remote-code-execution.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/typo3-leak-to-remote-code-execution.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/gpgme-used-confusion-its-super-effective.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/gpgme-used-confusion-its-super-effective.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/gpgme-used-confusion-its-super-effective.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/rm-rf-is-the-root-of-all-evil.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/rm-rf-is-the-root-of-all-evil.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/rm-rf-is-the-root-of-all-evil.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/exploiting-cve-2021-25770-a-server-side-template-injection-in-youtrack.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/exploiting-cve-2021-25770-a-server-side-template-injection-in-youtrack.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/exploiting-cve-2021-25770-a-server-side-template-injection-in-youtrack.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/analysis-and-exploitation-of-the-ios-kernel-vulnerability-cve-2021-1782.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/analysis-and-exploitation-of-the-ios-kernel-vulnerability-cve-2021-1782.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/analysis-and-exploitation-of-the-ios-kernel-vulnerability-cve-2021-1782.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/kubernetes-namespaces-isolation-what-it-is-what-it-isnt-life-universe-and-everything.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/kubernetes-namespaces-isolation-what-it-is-what-it-isnt-life-universe-and-everything.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/kubernetes-namespaces-isolation-what-it-is-what-it-isnt-life-universe-and-everything.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/pentesting-cisco-aci-lldp-mishandling.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/pentesting-cisco-aci-lldp-mishandling.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/pentesting-cisco-aci-lldp-mishandling.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/an-interesting-feature-in-the-samsung-dsp-driver.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/an-interesting-feature-in-the-samsung-dsp-driver.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/an-interesting-feature-in-the-samsung-dsp-driver.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/dumping-the-sonos-one-smart-speaker.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/dumping-the-sonos-one-smart-speaker.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/dumping-the-sonos-one-smart-speaker.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/offres/formations/android-for-security-engineers.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/offers/trainings/android-for-security-engineers.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/offres/formations/android-for-security-engineers.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/offres/formations/password-cracking.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/offers/trainings/password-cracking.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/offres/formations/password-cracking.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/offres/formations/devops-linux-breach-tactics.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/offers/trainings/devops-linux-breach-tactics.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/offres/formations/devops-linux-breach-tactics.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/offres/formations/active-directory-intrusion-tactics-entry-level.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/offers/trainings/active-directory-intrusion-tactics-entry-level.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/offres/formations/active-directory-intrusion-tactics-entry-level.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/offres/formations/practical-web-0-day-hunting.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/offers/trainings/practical-web-0-day-hunting.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/offres/formations/practical-web-0-day-hunting.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/exploitation-of-a-double-free-vulnerability-in-ubuntu-shiftfs-driver-cve-2021-3492.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/exploitation-of-a-double-free-vulnerability-in-ubuntu-shiftfs-driver-cve-2021-3492.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/exploitation-of-a-double-free-vulnerability-in-ubuntu-shiftfs-driver-cve-2021-3492.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/playing-with-imagetragick-like-its-2016.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/playing-with-imagetragick-like-its-2016.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/playing-with-imagetragick-like-its-2016.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/baking-mojolicious-cookies.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/baking-mojolicious-cookies.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/baking-mojolicious-cookies.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/finding-gadgets-like-its-2015-part-1.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/finding-gadgets-like-its-2015-part-1.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/finding-gadgets-like-its-2015-part-1.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/writing-a-toy-symbolic-interpreter-and-solving-challenges-part-1.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/writing-a-toy-symbolic-interpreter-and-solving-challenges-part-1.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/writing-a-toy-symbolic-interpreter-and-solving-challenges-part-1.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/writing-a-toy-symbolic-interpreter-and-solving-challenges-part-2.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/writing-a-toy-symbolic-interpreter-and-solving-challenges-part-2.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/writing-a-toy-symbolic-interpreter-and-solving-challenges-part-2.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/writing-a-toy-symbolic-interpreter-and-solving-challenges-part-3.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/writing-a-toy-symbolic-interpreter-and-solving-challenges-part-3.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/writing-a-toy-symbolic-interpreter-and-solving-challenges-part-3.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/writing-a-toy-symbolic-interpreter-and-solving-challenges-part-4.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/writing-a-toy-symbolic-interpreter-and-solving-challenges-part-4.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/writing-a-toy-symbolic-interpreter-and-solving-challenges-part-4.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/finding-gadgets-like-its-2015-part-2.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/finding-gadgets-like-its-2015-part-2.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/finding-gadgets-like-its-2015-part-2.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/your-vulnerability-is-in-another-oem.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/your-vulnerability-is-in-another-oem.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/your-vulnerability-is-in-another-oem.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/htb-business-ctf-write-ups.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/htb-business-ctf-write-ups.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/htb-business-ctf-write-ups.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/cracking-radmin-server-3-passwords.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/cracking-radmin-server-3-passwords.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/cracking-radmin-server-3-passwords.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/dissecting-ntlm-epa-with-love-building-a-mitm-proxy.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/dissecting-ntlm-epa-with-love-building-a-mitm-proxy.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/dissecting-ntlm-epa-with-love-building-a-mitm-proxy.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/macos-xpc-exploitation-sandbox-share-case-study.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/macos-xpc-exploitation-sandbox-share-case-study.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/macos-xpc-exploitation-sandbox-share-case-study.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/is-it-post-quantum-time-yet.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/is-it-post-quantum-time-yet.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/is-it-post-quantum-time-yet.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/car-hijacking-swapping-a-single-bit.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/car-hijacking-swapping-a-single-bit.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/car-hijacking-swapping-a-single-bit.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/prestations/reponse-aux-incidents.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/features/incident-response.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/prestations/reponse-aux-incidents.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/our-team/reponse-aux-incidents.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/our-team/incident-response.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/our-team/reponse-aux-incidents.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/presentation-de-lequipe-reverse.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/reverse-engineering-team-presentation.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/presentation-de-lequipe-reverse.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/how-to-exploit-cve-2021-40539-on-manageengine-adselfservice-plus.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/how-to-exploit-cve-2021-40539-on-manageengine-adselfservice-plus.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/how-to-exploit-cve-2021-40539-on-manageengine-adselfservice-plus.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/notre-equipe/lequipe-support.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/our-team/back-office.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/notre-equipe/lequipe-support.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/yet-another-bec-investigation-on-m365.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/yet-another-bec-investigation-on-m365.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/yet-another-bec-investigation-on-m365.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/our-team/infrastructure.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/our-team/infrastructure.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/our-team/infrastructure.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/credential-stuffing-speeding-up-massive-leaks-databases.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/credential-stuffing-speeding-up-massive-leaks-databases.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/credential-stuffing-speeding-up-massive-leaks-databases.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/rutorrent-code-review.html</loc>
  <xhtml:link href="https://www.synacktiv.com/publications/rutorrent-code-review.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/rutorrent-code-review.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/developpeur-doutils-red-team.html</loc>
  <xhtml:link href="https://www.synacktiv.com/developpeur-doutils-red-team.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/developpeur-doutils-red-team.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/captain-hook-how-not-to-look-for-vulnerabilities-in-java-applications.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/captain-hook-how-not-to-look-for-vulnerabilities-in-java-applications.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/captain-hook-how-not-to-look-for-vulnerabilities-in-java-applications.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/unransomware.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/unransomware.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/unransomware.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/heap-tricks-never-get-old-insomnihack-teaser-2022.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/heap-tricks-never-get-old-insomnihack-teaser-2022.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/heap-tricks-never-get-old-insomnihack-teaser-2022.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/exploiting-a-remote-heap-overflow-with-a-custom-tcp-stack.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/exploiting-a-remote-heap-overflow-with-a-custom-tcp-stack.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/exploiting-a-remote-heap-overflow-with-a-custom-tcp-stack.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/finding-gadgets-like-its-2022.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/finding-gadgets-like-its-2022.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/finding-gadgets-like-its-2022.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/the-printer-goes-brrrrr.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/the-printer-goes-brrrrr.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/the-printer-goes-brrrrr.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/pwn2own-austin-2021-defeating-the-netgear-r6700v3.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/pwn2own-austin-2021-defeating-the-netgear-r6700v3.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/pwn2own-austin-2021-defeating-the-netgear-r6700v3.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/escaping-from-bhyve.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/escaping-from-bhyve.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/escaping-from-bhyve.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/elfinder-the-story-of-a-repwning.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/elfinder-the-story-of-a-repwning.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/elfinder-the-story-of-a-repwning.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/developpeur-qa-red-team.html</loc>
  <xhtml:link href="https://www.synacktiv.com/developpeur-qa-red-team.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/developpeur-qa-red-team.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/ready-for-it-2022-back-to-attacks-on-new-digital-uses.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/ready-for-it-2022-back-to-attacks-on-new-digital-uses.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/ready-for-it-2022-back-to-attacks-on-new-digital-uses.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/ccleaner-forensics.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/ccleaner-forensics.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/ccleaner-forensics.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/developpeur-backend-rust-pour-outils-dinvestigation-numerique.html</loc>
  <xhtml:link href="https://www.synacktiv.com/developpeur-backend-rust-pour-outils-dinvestigation-numerique.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/developpeur-backend-rust-pour-outils-dinvestigation-numerique.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/developpement-de-systemes-embarques-pour-outils-dinvestigation-numerique.html</loc>
  <xhtml:link href="https://www.synacktiv.com/developpement-de-systemes-embarques-pour-outils-dinvestigation-numerique.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/developpement-de-systemes-embarques-pour-outils-dinvestigation-numerique.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/test-et-validation-doutils-dinvestigation-numerique.html</loc>
  <xhtml:link href="https://www.synacktiv.com/test-et-validation-doutils-dinvestigation-numerique.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/test-et-validation-doutils-dinvestigation-numerique.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/developpement-dinterface-utilisateur-web-pour-outils-dinvestigation-numerique.html</loc>
  <xhtml:link href="https://www.synacktiv.com/developpement-dinterface-utilisateur-web-pour-outils-dinvestigation-numerique.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/developpement-dinterface-utilisateur-web-pour-outils-dinvestigation-numerique.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/cve-2022-31813-forwarding-addresses-is-hard.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/cve-2022-31813-forwarding-addresses-is-hard.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/cve-2022-31813-forwarding-addresses-is-hard.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/exploiting-cve-2022-24816-a-code-injection-in-the-jt-jiffle-extension-of-geoserver.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/exploiting-cve-2022-24816-a-code-injection-in-the-jt-jiffle-extension-of-geoserver.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/exploiting-cve-2022-24816-a-code-injection-in-the-jt-jiffle-extension-of-geoserver.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/azure-ad-introduction-for-red-teamers.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/azure-ad-introduction-for-red-teamers.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/azure-ad-introduction-for-red-teamers.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/pentester-digital-ninja.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/pentester-digital-ninja.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/pentester-digital-ninja.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/notre-equipe/pentest.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/our-team/pentest.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/notre-equipe/pentest.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/recherche-et-exploitation-de-vulnerabilite.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/vulnerability-research-and-exploitation.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/recherche-et-exploitation-de-vulnerabilite.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/traces-of-windows-remote-command-execution.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/traces-of-windows-remote-command-execution.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/traces-of-windows-remote-command-execution.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/php-filters-chain-what-is-it-and-how-to-use-it.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/php-filters-chain-what-is-it-and-how-to-use-it.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/php-filters-chain-what-is-it-and-how-to-use-it.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/commerciale-avant-vente.html</loc>
  <xhtml:link href="https://www.synacktiv.com/commerciale-avant-vente.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/commerciale-avant-vente.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/legitimate-rats-a-comprehensive-forensic-analysis-of-the-usual-suspects.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/legitimate-rats-a-comprehensive-forensic-analysis-of-the-usual-suspects.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/legitimate-rats-a-comprehensive-forensic-analysis-of-the-usual-suspects.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/persistent-php-payloads-in-pngs-how-to-inject-php-code-in-an-image-and-keep-it-there.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/persistent-php-payloads-in-pngs-how-to-inject-php-code-in-an-image-and-keep-it-there.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/persistent-php-payloads-in-pngs-how-to-inject-php-code-in-an-image-and-keep-it-there.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/cicd-secrets-extraction-tips-and-tricks.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/cicd-secrets-extraction-tips-and-tricks.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/cicd-secrets-extraction-tips-and-tricks.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/a-dive-into-microsoft-defender-for-identity.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/a-dive-into-microsoft-defender-for-identity.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/a-dive-into-microsoft-defender-for-identity.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/a-study-on-windows-http-authentication-part-ii.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/a-study-on-windows-http-authentication-part-ii.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/a-study-on-windows-http-authentication-part-ii.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/pridelocker-a-new-fork-of-babuk-esx-encryptor.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/pridelocker-a-new-fork-of-babuk-esx-encryptor.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/pridelocker-a-new-fork-of-babuk-esx-encryptor.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/building-a-iouring-based-network-scanner-in-rust.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/building-a-iouring-based-network-scanner-in-rust.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/building-a-iouring-based-network-scanner-in-rust.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/cool-vulns-dont-live-long-netgear-and-pwn2own.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/cool-vulns-dont-live-long-netgear-and-pwn2own.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/cool-vulns-dont-live-long-netgear-and-pwn2own.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/hardware-investigation-of-wireless-keyloggers.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/hardware-investigation-of-wireless-keyloggers.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/hardware-investigation-of-wireless-keyloggers.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/the-printer-goes-brrrrr-again.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/the-printer-goes-brrrrr-again.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/the-printer-goes-brrrrr-again.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/windows-secrets-extraction-a-summary.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/windows-secrets-extraction-a-summary.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/windows-secrets-extraction-a-summary.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/offres/formations/offensive-security-fundamentals.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/offers/trainings/offensive-security-fundamentals.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/offres/formations/offensive-security-fundamentals.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/i-hack-u-boot.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/i-hack-u-boot.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/i-hack-u-boot.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/php-filter-chains-file-read-from-error-based-oracle.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/php-filter-chains-file-read-from-error-based-oracle.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/php-filter-chains-file-read-from-error-based-oracle.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/offres/formations/cloud-intrusion-tactics.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/offers/trainings/cloud-intrusion-tactics.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/offres/formations/cloud-intrusion-tactics.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/analyste-en-reponse-aux-incidents-dfir.html</loc>
  <xhtml:link href="https://www.synacktiv.com/analyste-en-reponse-aux-incidents-dfir.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/analyste-en-reponse-aux-incidents-dfir.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/exploring-android-heap-allocations-in-jemalloc-new.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/exploring-android-heap-allocations-in-jemalloc-new.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/exploring-android-heap-allocations-in-jemalloc-new.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/notre-equipe/reverse.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/our-team/reverse.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/notre-equipe/reverse.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/magento-for-security-audit.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/magento-for-security-audit.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/magento-for-security-audit.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/magento-template-engine-a-story-of-cve-2022-24086.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/magento-template-engine-a-story-of-cve-2022-24086.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/magento-template-engine-a-story-of-cve-2022-24086.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/our-team/revelio.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/our-team/revelio.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/our-team/revelio.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/web-architect-an-introduction.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/web-architect-an-introduction.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/web-architect-an-introduction.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/evm-unravelled-recovering-abi-from-bytecode.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/evm-unravelled-recovering-abi-from-bytecode.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/evm-unravelled-recovering-abi-from-bytecode.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/offres/formations/windows-forensics.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/offers/trainings/windows-forensics.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/offres/formations/windows-forensics.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/offres/formations/linux-forensics.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/offers/trainings/linux-forensics.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/offres/formations/linux-forensics.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/offres/formations/mobile-forensics.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/offers/trainings/mobile-forensics.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/offres/formations/mobile-forensics.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/offres/formations/malware-analysis.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/offers/trainings/malware-analysis.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/offres/formations/malware-analysis.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/offres/formations/ios-for-security-engineers.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/offers/trainings/ios-for-security-engineers.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/offres/formations/ios-for-security-engineers.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/offres/formations/advanced-ida.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/offers/trainings/advanced-ida.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/offres/formations/advanced-ida.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/offres/formations/intrusion-hardware.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/offers/trainings/hardware-intrusion.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/offres/formations/intrusion-hardware.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/offres/formations/active-directory-intrusion-tactics-advanced-level.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/offers/trainings/active-directory-intrusion-tactics-advanced-level.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/offres/formations/active-directory-intrusion-tactics-advanced-level.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/offres/formations/anti-forensic.html</loc>
  <xhtml:link href="https://www.synacktiv.com/offres/formations/anti-forensic.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/offres/formations/anti-forensic.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/offres/formations/attacking-android-applications.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/offers/trainings/attacking-android-applications.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/offres/formations/attacking-android-applications.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/java-deserialization-tricks.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/java-deserialization-tricks.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/java-deserialization-tricks.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/wordpress-for-security-audit.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/wordpress-for-security-audit.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/wordpress-for-security-audit.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/forensic-aspects-of-microsoft-remote-access-vpn.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/forensic-aspects-of-microsoft-remote-access-vpn.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/forensic-aspects-of-microsoft-remote-access-vpn.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/old-bug-shallow-bug-exploiting-ubuntu-at-pwn2own-vancouver-2023.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/old-bug-shallow-bug-exploiting-ubuntu-at-pwn2own-vancouver-2023.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/old-bug-shallow-bug-exploiting-ubuntu-at-pwn2own-vancouver-2023.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/finding-a-pop-chain-on-a-common-symfony-bundle-part-1.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/finding-a-pop-chain-on-a-common-symfony-bundle-part-1.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/finding-a-pop-chain-on-a-common-symfony-bundle-part-1.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/gpoddity-exploiting-active-directory-gpos-through-ntlm-relaying-and-more.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/gpoddity-exploiting-active-directory-gpos-through-ntlm-relaying-and-more.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/gpoddity-exploiting-active-directory-gpos-through-ntlm-relaying-and-more.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/pcapan-a-pcap-analysis-helper.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/pcapan-a-pcap-analysis-helper.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/pcapan-a-pcap-analysis-helper.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/legitimate-exfiltration-tools-summary-and-detection-for-incident-response-and-threat.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/legitimate-exfiltration-tools-summary-and-detection-for-incident-response-and-threat.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/legitimate-exfiltration-tools-summary-and-detection-for-incident-response-and-threat.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/presentation-of-the-pentest-team.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/presentation-of-the-pentest-team.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/presentation-of-the-pentest-team.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/introducing-ntdissector-a-swiss-army-knife-for-your-ntdsdit-files.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/introducing-ntdissector-a-swiss-army-knife-for-your-ntdsdit-files.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/introducing-ntdissector-a-swiss-army-knife-for-your-ntdsdit-files.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/finding-a-pop-chain-on-a-common-symfony-bundle-part-2.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/finding-a-pop-chain-on-a-common-symfony-bundle-part-2.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/finding-a-pop-chain-on-a-common-symfony-bundle-part-2.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/systemd-hardening-made-easy-with-shh.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/systemd-hardening-made-easy-with-shh.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/systemd-hardening-made-easy-with-shh.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/behind-the-shield-unmasking-scudos-defenses.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/behind-the-shield-unmasking-scudos-defenses.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/behind-the-shield-unmasking-scudos-defenses.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/exploring-counter-strike-global-offensive-attack-surface.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/exploring-counter-strike-global-offensive-attack-surface.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/exploring-counter-strike-global-offensive-attack-surface.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/notre-equipe/developpement.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/our-team/development.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/notre-equipe/developpement.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/frinet-reverse-engineering-made-easier.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/frinet-reverse-engineering-made-easier.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/frinet-reverse-engineering-made-easier.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/how-to-voltage-fault-injection.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/how-to-voltage-fault-injection.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/how-to-voltage-fault-injection.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/using-ntdissector-to-extract-secrets-from-adam-ntds-files.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/using-ntdissector-to-extract-secrets-from-adam-ntds-files.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/using-ntdissector-to-extract-secrets-from-adam-ntds-files.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/writing-a-decent-win32-keylogger-13.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/writing-a-decent-win32-keylogger-13.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/writing-a-decent-win32-keylogger-13.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/writing-a-decent-win32-keylogger-23.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/writing-a-decent-win32-keylogger-23.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/writing-a-decent-win32-keylogger-23.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/writing-a-decent-win32-keylogger-33.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/writing-a-decent-win32-keylogger-33.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/writing-a-decent-win32-keylogger-33.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/vmware-esxi-forensic-with-velociraptor.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/vmware-esxi-forensic-with-velociraptor.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/vmware-esxi-forensic-with-velociraptor.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/leveraging-binary-ninja-il-to-reverse-a-custom-isa-cracking-the-pot-of-gold-37c3.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/leveraging-binary-ninja-il-to-reverse-a-custom-isa-cracking-the-pot-of-gold-37c3.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/leveraging-binary-ninja-il-to-reverse-a-custom-isa-cracking-the-pot-of-gold-37c3.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/using-veeam-metadata-for-efficient-extraction-of-backup-artefacts-13.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/using-veeam-metadata-for-efficient-extraction-of-backup-artefacts-13.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/using-veeam-metadata-for-efficient-extraction-of-backup-artefacts-13.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/injecting-java-in-memory-payloads-for-post-exploitation.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/injecting-java-in-memory-payloads-for-post-exploitation.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/injecting-java-in-memory-payloads-for-post-exploitation.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/krustyloader-rust-malware-linked-to-ivanti-connectsecure-compromises.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/krustyloader-rust-malware-linked-to-ivanti-connectsecure-compromises.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/krustyloader-rust-malware-linked-to-ivanti-connectsecure-compromises.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/github-actions-exploitation-introduction.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/github-actions-exploitation-introduction.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/github-actions-exploitation-introduction.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/github-actions-exploitation-untrusted-input.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/github-actions-exploitation-untrusted-input.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/github-actions-exploitation-untrusted-input.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/arlo-im-watching-you.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/arlo-im-watching-you.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/arlo-im-watching-you.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/github-actions-exploitation-repo-jacking-and-environment-manipulation.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/github-actions-exploitation-repo-jacking-and-environment-manipulation.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/github-actions-exploitation-repo-jacking-and-environment-manipulation.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/github-actions-exploitation-self-hosted-runners.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/github-actions-exploitation-self-hosted-runners.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/github-actions-exploitation-self-hosted-runners.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/pentesting-cisco-sd-wan-part-1-attacking-vmanage.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/pentesting-cisco-sd-wan-part-1-attacking-vmanage.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/pentesting-cisco-sd-wan-part-1-attacking-vmanage.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/ios-a-journey-in-the-usb-networking-stack.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/ios-a-journey-in-the-usb-networking-stack.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/ios-a-journey-in-the-usb-networking-stack.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/pentesting-cisco-sd-wan-part-2-breaking-routers.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/pentesting-cisco-sd-wan-part-2-breaking-routers.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/pentesting-cisco-sd-wan-part-2-breaking-routers.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/so-i-became-a-node-exploiting-bootstrap-tokens-in-azure-kubernetes-service.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/so-i-became-a-node-exploiting-bootstrap-tokens-in-azure-kubernetes-service.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/so-i-became-a-node-exploiting-bootstrap-tokens-in-azure-kubernetes-service.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/quantum-readiness-introduction-to-modern-cryptography.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/quantum-readiness-introduction-to-modern-cryptography.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/quantum-readiness-introduction-to-modern-cryptography.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/quantum-readiness-lattice-based-pqc.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/quantum-readiness-lattice-based-pqc.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/quantum-readiness-lattice-based-pqc.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/entra-id-banned-password-lists-password-spraying-optimizations-and-defenses.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/entra-id-banned-password-lists-password-spraying-optimizations-and-defenses.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/entra-id-banned-password-lists-password-spraying-optimizations-and-defenses.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/looting-symfony-with-eos.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/looting-symfony-with-eos.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/looting-symfony-with-eos.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/fuzzing-confused-dependencies-with-depfuzzer.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/fuzzing-confused-dependencies-with-depfuzzer.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/fuzzing-confused-dependencies-with-depfuzzer.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/exploiting-american-conquest.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/exploiting-american-conquest.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/exploiting-american-conquest.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/souls-without-bodies-phantom-types-shenanigans.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/souls-without-bodies-phantom-types-shenanigans.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/souls-without-bodies-phantom-types-shenanigans.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/ounedpy-exploiting-hidden-organizational-units-acl-attack-vectors-in-active-directory.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/ounedpy-exploiting-hidden-organizational-units-acl-attack-vectors-in-active-directory.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/ounedpy-exploiting-hidden-organizational-units-acl-attack-vectors-in-active-directory.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/understanding-and-evading-microsoft-defender-for-identity-pkinit-detection.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/understanding-and-evading-microsoft-defender-for-identity-pkinit-detection.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/understanding-and-evading-microsoft-defender-for-identity-pkinit-detection.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/how-to-exploit-liferay-cve-2020-7961-quick-journey-to-poc.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/how-to-exploit-liferay-cve-2020-7961-quick-journey-to-poc.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/how-to-exploit-liferay-cve-2020-7961-quick-journey-to-poc.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/hijacking-github-runners-to-compromise-the-organization.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/hijacking-github-runners-to-compromise-the-organization.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/hijacking-github-runners-to-compromise-the-organization.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/whfb-and-entra-id-say-hello-to-your-new-cache-flow.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/whfb-and-entra-id-say-hello-to-your-new-cache-flow.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/whfb-and-entra-id-say-hello-to-your-new-cache-flow.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/inside-the-ios-bug-that-made-deleted-photos-reappear.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/inside-the-ios-bug-that-made-deleted-photos-reappear.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/inside-the-ios-bug-that-made-deleted-photos-reappear.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/node/1295.html</loc>
  <xhtml:link href="https://www.synacktiv.com/node/1295.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/node/1295.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/node/1319.html</loc>
  <xhtml:link href="https://www.synacktiv.com/node/1319.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/node/1319.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/search/node/help.html</loc>
  <xhtml:link href="https://www.synacktiv.com/search/node/help.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/search/node/help.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/offres/formations/calendrier.html</loc>
  <xhtml:link href="https://www.synacktiv.com/offres/formations/calendrier.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/offres/formations/calendrier.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/offres/formations/modalites.html</loc>
  <xhtml:link href="https://www.synacktiv.com/offres/formations/modalites.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/offres/formations/modalites.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/offres/formations.html</loc>
  <xhtml:link href="https://www.synacktiv.com/offres/formations.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/offres/formations.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/advisories/activid-authentication-bypass.html</loc>
  <xhtml:link href="https://www.synacktiv.com/advisories/activid-authentication-bypass.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/advisories/activid-authentication-bypass.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/advisories/dangerous-feature-in-commvault-commserve-1134.html</loc>
  <xhtml:link href="https://www.synacktiv.com/advisories/dangerous-feature-in-commvault-commserve-1134.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/advisories/dangerous-feature-in-commvault-commserve-1134.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/advisories/fortimanager-multiple-vulnerabilities.html</loc>
  <xhtml:link href="https://www.synacktiv.com/advisories/fortimanager-multiple-vulnerabilities.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/advisories/fortimanager-multiple-vulnerabilities.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/advisories/ivanti-sentry-mobileiron-sentry-unauthenticated-remote-code-execution.html</loc>
  <xhtml:link href="https://www.synacktiv.com/advisories/ivanti-sentry-mobileiron-sentry-unauthenticated-remote-code-execution.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/advisories/ivanti-sentry-mobileiron-sentry-unauthenticated-remote-code-execution.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/advisories/ssrpm-arbitrary-password-reset-on-default-client-web-interface-installation.html</loc>
  <xhtml:link href="https://www.synacktiv.com/advisories/ssrpm-arbitrary-password-reset-on-default-client-web-interface-installation.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/advisories/ssrpm-arbitrary-password-reset-on-default-client-web-interface-installation.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/advisories/local-privilege-escalation-in-sap.html</loc>
  <xhtml:link href="https://www.synacktiv.com/advisories/local-privilege-escalation-in-sap.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/advisories/local-privilege-escalation-in-sap.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/advisories/remote-code-execution-on-pyres-termod-before-1004w.html</loc>
  <xhtml:link href="https://www.synacktiv.com/advisories/remote-code-execution-on-pyres-termod-before-1004w.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/advisories/remote-code-execution-on-pyres-termod-before-1004w.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/advisories/ivanti-epmm-mobileiron-core-multiple-vulnerabilities.html</loc>
  <xhtml:link href="https://www.synacktiv.com/advisories/ivanti-epmm-mobileiron-core-multiple-vulnerabilities.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/advisories/ivanti-epmm-mobileiron-core-multiple-vulnerabilities.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/advisories/multiple-vulnerabilities-on-gestsup-3244.html</loc>
  <xhtml:link href="https://www.synacktiv.com/advisories/multiple-vulnerabilities-on-gestsup-3244.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/advisories/multiple-vulnerabilities-on-gestsup-3244.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/advisories/remote-code-execution-on-cisco-access-point-wap371-firmware-1307.html</loc>
  <xhtml:link href="https://www.synacktiv.com/advisories/remote-code-execution-on-cisco-access-point-wap371-firmware-1307.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/advisories/remote-code-execution-on-cisco-access-point-wap371-firmware-1307.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/advisories/windows-authenticated-remote-command-execution.html</loc>
  <xhtml:link href="https://www.synacktiv.com/advisories/windows-authenticated-remote-command-execution.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/advisories/windows-authenticated-remote-command-execution.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/advisories/microsoft-configuration-manager-configmgr-2403-unauthenticated-sql-injections.html</loc>
  <xhtml:link href="https://www.synacktiv.com/advisories/microsoft-configuration-manager-configmgr-2403-unauthenticated-sql-injections.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/advisories/microsoft-configuration-manager-configmgr-2403-unauthenticated-sql-injections.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/advisories/oracle-retail-xstore-suite-pre-authenticated-path-traversal.html</loc>
  <xhtml:link href="https://www.synacktiv.com/advisories/oracle-retail-xstore-suite-pre-authenticated-path-traversal.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/advisories/oracle-retail-xstore-suite-pre-authenticated-path-traversal.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/advisories/livewire-remote-command-execution-through-unmarshaling.html</loc>
  <xhtml:link href="https://www.synacktiv.com/advisories/livewire-remote-command-execution-through-unmarshaling.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/advisories/livewire-remote-command-execution-through-unmarshaling.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/advisories/solidserver-ddi-remote-command-execution-as-root.html</loc>
  <xhtml:link href="https://www.synacktiv.com/advisories/solidserver-ddi-remote-command-execution-as-root.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/advisories/solidserver-ddi-remote-command-execution-as-root.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/advisories/crater-invoice-unauthenticated-remote-command-execution-when-appkey-known.html</loc>
  <xhtml:link href="https://www.synacktiv.com/advisories/crater-invoice-unauthenticated-remote-command-execution-when-appkey-known.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/advisories/crater-invoice-unauthenticated-remote-command-execution-when-appkey-known.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/advisories/remote-code-execution-from-any-domain-account-in-biztalk360.html</loc>
  <xhtml:link href="https://www.synacktiv.com/advisories/remote-code-execution-from-any-domain-account-in-biztalk360.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/advisories/remote-code-execution-from-any-domain-account-in-biztalk360.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/advisories/sonarqube-github-integration-information-leakage.html</loc>
  <xhtml:link href="https://www.synacktiv.com/advisories/sonarqube-github-integration-information-leakage.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/advisories/sonarqube-github-integration-information-leakage.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/advisories/jpgraph-professional-version-pre-authenticated-remote-code-execution.html</loc>
  <xhtml:link href="https://www.synacktiv.com/advisories/jpgraph-professional-version-pre-authenticated-remote-code-execution.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/advisories/jpgraph-professional-version-pre-authenticated-remote-code-execution.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/advisories/etic-telecom-ipl-dac-400-le-multiple-vulnerabilities.html</loc>
  <xhtml:link href="https://www.synacktiv.com/advisories/etic-telecom-ipl-dac-400-le-multiple-vulnerabilities.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/advisories/etic-telecom-ipl-dac-400-le-multiple-vulnerabilities.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/advisories/file-read-in-itop.html</loc>
  <xhtml:link href="https://www.synacktiv.com/advisories/file-read-in-itop.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/advisories/file-read-in-itop.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/advisories/local-privilege-escalation-in-windows-velociraptor-service.html</loc>
  <xhtml:link href="https://www.synacktiv.com/advisories/local-privilege-escalation-in-windows-velociraptor-service.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/advisories/local-privilege-escalation-in-windows-velociraptor-service.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/advisories/windows-10-plugscheduler-elevation-of-privilege.html</loc>
  <xhtml:link href="https://www.synacktiv.com/advisories/windows-10-plugscheduler-elevation-of-privilege.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/advisories/windows-10-plugscheduler-elevation-of-privilege.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/advisories/unauthenticated-server-side-request-forgery-crlf-injection-in-geoserver-wms.html</loc>
  <xhtml:link href="https://www.synacktiv.com/advisories/unauthenticated-server-side-request-forgery-crlf-injection-in-geoserver-wms.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/advisories/unauthenticated-server-side-request-forgery-crlf-injection-in-geoserver-wms.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/advisories/misp-arbitrary-file-read.html</loc>
  <xhtml:link href="https://www.synacktiv.com/advisories/misp-arbitrary-file-read.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/advisories/misp-arbitrary-file-read.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/advisories/security-vulnerabilities-in-snipe-it.html</loc>
  <xhtml:link href="https://www.synacktiv.com/advisories/security-vulnerabilities-in-snipe-it.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/advisories/security-vulnerabilities-in-snipe-it.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/advisories/scriptcase-pre-authenticated-remote-command-execution.html</loc>
  <xhtml:link href="https://www.synacktiv.com/advisories/scriptcase-pre-authenticated-remote-command-execution.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/advisories/scriptcase-pre-authenticated-remote-command-execution.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/advisories/help-scout-mass-assignment-vulnerability-on-inbox-settings.html</loc>
  <xhtml:link href="https://www.synacktiv.com/advisories/help-scout-mass-assignment-vulnerability-on-inbox-settings.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/advisories/help-scout-mass-assignment-vulnerability-on-inbox-settings.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/advisories/multiple-vulnerabilities-in-delmia-apriso-2019-to-2024.html</loc>
  <xhtml:link href="https://www.synacktiv.com/advisories/multiple-vulnerabilities-in-delmia-apriso-2019-to-2024.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/advisories/multiple-vulnerabilities-in-delmia-apriso-2019-to-2024.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/advisories/snipe-it-unauthenticated-remote-command-execution-when-appkey-known.html</loc>
  <xhtml:link href="https://www.synacktiv.com/advisories/snipe-it-unauthenticated-remote-command-execution-when-appkey-known.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/advisories/snipe-it-unauthenticated-remote-command-execution-when-appkey-known.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/advisories/netwrix-directory-manager-groupid-local-privilege-escalation-due-to-cross-site-scripting.html</loc>
  <xhtml:link href="https://www.synacktiv.com/advisories/netwrix-directory-manager-groupid-local-privilege-escalation-due-to-cross-site-scripting.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/advisories/netwrix-directory-manager-groupid-local-privilege-escalation-due-to-cross-site-scripting.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/advisories/code-execution-in-cisco-secure-client-with-nam.html</loc>
  <xhtml:link href="https://www.synacktiv.com/advisories/code-execution-in-cisco-secure-client-with-nam.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/advisories/code-execution-in-cisco-secure-client-with-nam.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/advisories/multiple-vulnerabilities-on-itop.html</loc>
  <xhtml:link href="https://www.synacktiv.com/advisories/multiple-vulnerabilities-on-itop.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/advisories/multiple-vulnerabilities-on-itop.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/advisories/usercube-netwrix-multiple-vulnerabilities.html</loc>
  <xhtml:link href="https://www.synacktiv.com/advisories/usercube-netwrix-multiple-vulnerabilities.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/advisories/usercube-netwrix-multiple-vulnerabilities.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/advisories/vulnerable-upgrade-mechanism-in-zkteco-f18-device.html</loc>
  <xhtml:link href="https://www.synacktiv.com/advisories/vulnerable-upgrade-mechanism-in-zkteco-f18-device.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/advisories/vulnerable-upgrade-mechanism-in-zkteco-f18-device.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/advisories/sap-financial-consolidation-admin-authentication-bypass.html</loc>
  <xhtml:link href="https://www.synacktiv.com/advisories/sap-financial-consolidation-admin-authentication-bypass.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/advisories/sap-financial-consolidation-admin-authentication-bypass.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/advisories/phar-deserialization-cve-2023-28115-patch-bypass.html</loc>
  <xhtml:link href="https://www.synacktiv.com/advisories/phar-deserialization-cve-2023-28115-patch-bypass.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/advisories/phar-deserialization-cve-2023-28115-patch-bypass.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/advisories/multiple-vulnerabilities-in-glpi.html</loc>
  <xhtml:link href="https://www.synacktiv.com/advisories/multiple-vulnerabilities-in-glpi.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/advisories/multiple-vulnerabilities-in-glpi.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/advisories/multiple-vulnerabilities-in-collabora-online.html</loc>
  <xhtml:link href="https://www.synacktiv.com/advisories/multiple-vulnerabilities-in-collabora-online.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/advisories/multiple-vulnerabilities-in-collabora-online.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/advisories/invoiceninja-unauthenticated-remote-command-execution-when-appkey-known.html</loc>
  <xhtml:link href="https://www.synacktiv.com/advisories/invoiceninja-unauthenticated-remote-command-execution-when-appkey-known.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/advisories/invoiceninja-unauthenticated-remote-command-execution-when-appkey-known.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications/the-reverse-engineering-team-presentation.html</loc>
  <xhtml:link href="https://www.synacktiv.com/publications/the-reverse-engineering-team-presentation.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications/the-reverse-engineering-team-presentation.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/produits/kraqozorus.html</loc>
  <xhtml:link href="https://www.synacktiv.com/produits/kraqozorus.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/produits/kraqozorus.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/en/node/627.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/node/627.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/en/node/627.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/en/node/1042.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/node/1042.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/en/node/1042.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/en/node/1059.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/node/1059.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/en/node/1059.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/en/node/1320.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/node/1320.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/en/node/1320.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/en/node/1255.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/node/1255.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/en/node/1255.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/en/node/643.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/node/643.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/en/node/643.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/en/node/1280.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/node/1280.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/en/node/1280.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/en/node/644.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/node/644.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/en/node/644.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/en/node/1296.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/node/1296.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/en/node/1296.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/en/node/1256.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/node/1256.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/en/node/1256.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/en/node/1312.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/node/1312.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/en/node/1312.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/en/node/611.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/node/611.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/en/node/611.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/en/node/1052.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/node/1052.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/en/node/1052.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/en/node/1257.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/node/1257.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/en/node/1257.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/en/node/642.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/node/642.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/en/node/642.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/en/node/772.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/node/772.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/en/node/772.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/en/node/641.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/node/641.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/en/node/641.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/en/node/1259.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/node/1259.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/en/node/1259.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/en/node/1276.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/node/1276.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/en/node/1276.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/en/node/1314.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/node/1314.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/en/node/1314.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/en/node/1258.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/node/1258.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/en/node/1258.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/en/search/node.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/search/node.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/en/search/node.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/en/advisories/activid-authentication-bypass.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/advisories/activid-authentication-bypass.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/en/advisories/activid-authentication-bypass.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/en/advisories/dangerous-feature-in-commvault-commserve-1134.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/advisories/dangerous-feature-in-commvault-commserve-1134.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/en/advisories/dangerous-feature-in-commvault-commserve-1134.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/en/advisories/fortimanager-multiple-vulnerabilities.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/advisories/fortimanager-multiple-vulnerabilities.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/en/advisories/fortimanager-multiple-vulnerabilities.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/en/advisories/ivanti-sentry-mobileiron-sentry-unauthenticated-remote-code-execution.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/advisories/ivanti-sentry-mobileiron-sentry-unauthenticated-remote-code-execution.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/en/advisories/ivanti-sentry-mobileiron-sentry-unauthenticated-remote-code-execution.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/en/advisories/ssrpm-arbitrary-password-reset-on-default-client-web-interface-installation.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/advisories/ssrpm-arbitrary-password-reset-on-default-client-web-interface-installation.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/en/advisories/ssrpm-arbitrary-password-reset-on-default-client-web-interface-installation.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/en/advisories/local-privilege-escalation-in-sap.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/advisories/local-privilege-escalation-in-sap.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/en/advisories/local-privilege-escalation-in-sap.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/en/advisories/remote-code-execution-on-pyres-termod-before-1004w.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/advisories/remote-code-execution-on-pyres-termod-before-1004w.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/en/advisories/remote-code-execution-on-pyres-termod-before-1004w.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/en/advisories/ivanti-epmm-mobileiron-core-multiple-vulnerabilities.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/advisories/ivanti-epmm-mobileiron-core-multiple-vulnerabilities.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/en/advisories/ivanti-epmm-mobileiron-core-multiple-vulnerabilities.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/en/advisories/multiple-vulnerabilities-on-gestsup-3244.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/advisories/multiple-vulnerabilities-on-gestsup-3244.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/en/advisories/multiple-vulnerabilities-on-gestsup-3244.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/en/advisories/remote-code-execution-on-cisco-access-point-wap371-firmware-1307.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/advisories/remote-code-execution-on-cisco-access-point-wap371-firmware-1307.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/en/advisories/remote-code-execution-on-cisco-access-point-wap371-firmware-1307.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/en/advisories/windows-authenticated-remote-command-execution.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/advisories/windows-authenticated-remote-command-execution.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/en/advisories/windows-authenticated-remote-command-execution.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/en/advisories/microsoft-configuration-manager-configmgr-2403-unauthenticated-sql-injections.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/advisories/microsoft-configuration-manager-configmgr-2403-unauthenticated-sql-injections.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/en/advisories/microsoft-configuration-manager-configmgr-2403-unauthenticated-sql-injections.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/en/advisories/oracle-retail-xstore-suite-pre-authenticated-path-traversal.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/advisories/oracle-retail-xstore-suite-pre-authenticated-path-traversal.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/en/advisories/oracle-retail-xstore-suite-pre-authenticated-path-traversal.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/en/advisories/livewire-remote-command-execution-through-unmarshaling.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/advisories/livewire-remote-command-execution-through-unmarshaling.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/en/advisories/livewire-remote-command-execution-through-unmarshaling.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/en/advisories/solidserver-ddi-remote-command-execution-as-root.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/advisories/solidserver-ddi-remote-command-execution-as-root.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/en/advisories/solidserver-ddi-remote-command-execution-as-root.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/en/advisories/crater-invoice-unauthenticated-remote-command-execution-when-appkey-known.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/advisories/crater-invoice-unauthenticated-remote-command-execution-when-appkey-known.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/en/advisories/crater-invoice-unauthenticated-remote-command-execution-when-appkey-known.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/en/advisories/remote-code-execution-from-any-domain-account-in-biztalk360.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/advisories/remote-code-execution-from-any-domain-account-in-biztalk360.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/en/advisories/remote-code-execution-from-any-domain-account-in-biztalk360.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/en/advisories/sonarqube-github-integration-information-leakage.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/advisories/sonarqube-github-integration-information-leakage.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/en/advisories/sonarqube-github-integration-information-leakage.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/en/advisories/jpgraph-professional-version-pre-authenticated-remote-code-execution.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/advisories/jpgraph-professional-version-pre-authenticated-remote-code-execution.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/en/advisories/jpgraph-professional-version-pre-authenticated-remote-code-execution.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/en/advisories/etic-telecom-ipl-dac-400-le-multiple-vulnerabilities.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/advisories/etic-telecom-ipl-dac-400-le-multiple-vulnerabilities.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/en/advisories/etic-telecom-ipl-dac-400-le-multiple-vulnerabilities.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/en/advisories/file-read-in-itop.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/advisories/file-read-in-itop.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/en/advisories/file-read-in-itop.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/en/advisories/local-privilege-escalation-in-windows-velociraptor-service.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/advisories/local-privilege-escalation-in-windows-velociraptor-service.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/en/advisories/local-privilege-escalation-in-windows-velociraptor-service.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/en/advisories/windows-10-plugscheduler-elevation-of-privilege.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/advisories/windows-10-plugscheduler-elevation-of-privilege.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/en/advisories/windows-10-plugscheduler-elevation-of-privilege.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/en/advisories/unauthenticated-server-side-request-forgery-crlf-injection-in-geoserver-wms.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/advisories/unauthenticated-server-side-request-forgery-crlf-injection-in-geoserver-wms.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/en/advisories/unauthenticated-server-side-request-forgery-crlf-injection-in-geoserver-wms.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/en/advisories/misp-arbitrary-file-read.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/advisories/misp-arbitrary-file-read.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/en/advisories/misp-arbitrary-file-read.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/en/advisories/security-vulnerabilities-in-snipe-it.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/advisories/security-vulnerabilities-in-snipe-it.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/en/advisories/security-vulnerabilities-in-snipe-it.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/en/advisories/scriptcase-pre-authenticated-remote-command-execution.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/advisories/scriptcase-pre-authenticated-remote-command-execution.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/en/advisories/scriptcase-pre-authenticated-remote-command-execution.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/en/advisories/help-scout-mass-assignment-vulnerability-on-inbox-settings.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/advisories/help-scout-mass-assignment-vulnerability-on-inbox-settings.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/en/advisories/help-scout-mass-assignment-vulnerability-on-inbox-settings.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/en/advisories/multiple-vulnerabilities-in-delmia-apriso-2019-to-2024.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/advisories/multiple-vulnerabilities-in-delmia-apriso-2019-to-2024.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/en/advisories/multiple-vulnerabilities-in-delmia-apriso-2019-to-2024.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/en/advisories/snipe-it-unauthenticated-remote-command-execution-when-appkey-known.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/advisories/snipe-it-unauthenticated-remote-command-execution-when-appkey-known.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/en/advisories/snipe-it-unauthenticated-remote-command-execution-when-appkey-known.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/en/advisories/netwrix-directory-manager-groupid-local-privilege-escalation-due-to-cross-site-scripting.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/advisories/netwrix-directory-manager-groupid-local-privilege-escalation-due-to-cross-site-scripting.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/en/advisories/netwrix-directory-manager-groupid-local-privilege-escalation-due-to-cross-site-scripting.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/en/advisories/code-execution-in-cisco-secure-client-with-nam.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/advisories/code-execution-in-cisco-secure-client-with-nam.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/en/advisories/code-execution-in-cisco-secure-client-with-nam.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/en/advisories/multiple-vulnerabilities-on-itop.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/advisories/multiple-vulnerabilities-on-itop.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/en/advisories/multiple-vulnerabilities-on-itop.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/en/advisories/usercube-netwrix-multiple-vulnerabilities.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/advisories/usercube-netwrix-multiple-vulnerabilities.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/en/advisories/usercube-netwrix-multiple-vulnerabilities.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/en/advisories/vulnerable-upgrade-mechanism-in-zkteco-f18-device.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/advisories/vulnerable-upgrade-mechanism-in-zkteco-f18-device.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/en/advisories/vulnerable-upgrade-mechanism-in-zkteco-f18-device.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/en/advisories/sap-financial-consolidation-admin-authentication-bypass.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/advisories/sap-financial-consolidation-admin-authentication-bypass.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/en/advisories/sap-financial-consolidation-admin-authentication-bypass.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/en/advisories/phar-deserialization-cve-2023-28115-patch-bypass.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/advisories/phar-deserialization-cve-2023-28115-patch-bypass.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/en/advisories/phar-deserialization-cve-2023-28115-patch-bypass.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/en/advisories/multiple-vulnerabilities-in-glpi.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/advisories/multiple-vulnerabilities-in-glpi.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/en/advisories/multiple-vulnerabilities-in-glpi.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/en/advisories/multiple-vulnerabilities-in-collabora-online.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/advisories/multiple-vulnerabilities-in-collabora-online.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/en/advisories/multiple-vulnerabilities-in-collabora-online.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/en/advisories/invoiceninja-unauthenticated-remote-command-execution-when-appkey-known.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/advisories/invoiceninja-unauthenticated-remote-command-execution-when-appkey-known.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/en/advisories/invoiceninja-unauthenticated-remote-command-execution-when-appkey-known.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/en/products/kraqozorus.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/products/kraqozorus.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/en/products/kraqozorus.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/en/publications/rutorrent-code-review.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/rutorrent-code-review.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/en/publications/rutorrent-code-review.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/en/publications/kubernetes-forensics-13-what-the-container.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications/kubernetes-forensics-13-what-the-container.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/en/publications/kubernetes-forensics-13-what-the-container.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/en/offers/trainings/advanced-malware-analysis.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/offers/trainings/advanced-malware-analysis.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/en/offers/trainings/advanced-malware-analysis.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/en/offers/trainings/calendar.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/offers/trainings/calendar.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/en/offers/trainings/calendar.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/en/offers/trainings/terms-and-conditions.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/offers/trainings/terms-and-conditions.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/en/offers/trainings/terms-and-conditions.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/en/offers/trainings.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/offers/trainings.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/en/offers/trainings.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/en/csirt.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/csirt.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/en/csirt.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/en/our-offer.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/our-offer.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/en/our-offer.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/en/contact.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/contact.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/en/contact.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/en/publications.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/publications.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/en/publications.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/en/our-publications.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/our-publications.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/en/our-publications.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/en/ressources.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/ressources.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/en/ressources.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/en/advisories.html</loc>
  <xhtml:link href="https://www.synacktiv.com/en/advisories.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/en/advisories.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/csirt.html</loc>
  <xhtml:link href="https://www.synacktiv.com/csirt.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/csirt.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/faq-recrutement.html</loc>
  <xhtml:link href="https://www.synacktiv.com/faq-recrutement.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/faq-recrutement.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/contact.html</loc>
  <xhtml:link href="https://www.synacktiv.com/contact.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/contact.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/search.html</loc>
  <xhtml:link href="https://www.synacktiv.com/search.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/search.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/index.html</loc>
  <xhtml:link href="https://www.synacktiv.com/index.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/index.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/nos-publications.html</loc>
  <xhtml:link href="https://www.synacktiv.com/nos-publications.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/nos-publications.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/publications.html</loc>
  <xhtml:link href="https://www.synacktiv.com/publications.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/publications.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/ressources.html</loc>
  <xhtml:link href="https://www.synacktiv.com/ressources.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/ressources.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/advisories.html</loc>
  <xhtml:link href="https://www.synacktiv.com/advisories.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/advisories.html" hreflang="x-default" rel="alternate"/>
</url>

<url>
  <loc>https://www.synacktiv.com/notre-offre.html</loc>
  <xhtml:link href="https://www.synacktiv.com/notre-offre.html" hreflang="en" rel="alternate"/>
  <xhtml:link href="https://www.synacktiv.com/notre-offre.html" hreflang="x-default" rel="alternate"/>
</url>

</urlset>
