<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
<url>
<loc>https://armoredcode.com/blog/hello-world/</loc>
<lastmod>2012-03-16T09:58:00+00:00</lastmod>
</url>
<url>
<loc>https://armoredcode.com/blog/even-before-your-secure-coding-dot-dot-dot-patch-your-server/</loc>
<lastmod>2012-03-19T09:10:00+00:00</lastmod>
</url>
<url>
<loc>https://armoredcode.com/blog/understanding-your-attack-exposure/</loc>
<lastmod>2012-03-21T09:00:00+00:00</lastmod>
</url>
<url>
<loc>https://armoredcode.com/blog/h4f-palco-your-sinatra-skelethon-builder/</loc>
<lastmod>2012-03-30T09:00:00+00:00</lastmod>
</url>
<url>
<loc>https://armoredcode.com/blog/h4f-use-robots-dot-txt-as-a-weapon-with-links-rubygem/</loc>
<lastmod>2012-04-06T09:00:00+00:00</lastmod>
</url>
<url>
<loc>https://armoredcode.com/blog/papa-dont-breach/</loc>
<lastmod>2012-04-10T09:26:00+00:00</lastmod>
</url>
<url>
<loc>https://armoredcode.com/blog/understand-your-risk-disclosing-information/</loc>
<lastmod>2012-04-17T10:00:00+00:00</lastmod>
</url>
<url>
<loc>https://armoredcode.com/blog/h4f-invisible-proxy-dot-dot-dot-casper-gem/</loc>
<lastmod>2012-04-23T08:08:00+00:00</lastmod>
</url>
<url>
<loc>https://armoredcode.com/blog/bypassing-basic-authentication-in-php-applications/</loc>
<lastmod>2012-04-26T07:59:00+00:00</lastmod>
</url>
<url>
<loc>https://armoredcode.com/blog/new-monothematic-posts-serie-hackers-at-work/</loc>
<lastmod>2012-04-27T07:52:00+00:00</lastmod>
</url>
<url>
<loc>https://armoredcode.com/blog/open-the-code-or-review-it/</loc>
<lastmod>2012-05-02T08:09:00+00:00</lastmod>
</url>
<url>
<loc>https://armoredcode.com/blog/h-at-w-number-1-simon-bennetts-owasp-zap-project-leader/</loc>
<lastmod>2012-05-04T07:45:00+00:00</lastmod>
</url>
<url>
<loc>https://armoredcode.com/blog/is-by-design-by-contract-the-solution-for-safe-coding/</loc>
<lastmod>2012-05-10T08:02:00+00:00</lastmod>
</url>
<url>
<loc>https://armoredcode.com/blog/using-design-by-contract-and-tdd-to-enforce-security-the-coat-project/</loc>
<lastmod>2012-05-16T18:58:00+00:00</lastmod>
</url>
<url>
<loc>https://armoredcode.com/blog/h-at-w-number-2-matteo-parmi-ruby-hacker-and-opensource-enthusiast/</loc>
<lastmod>2012-05-21T17:27:00+00:00</lastmod>
</url>
<url>
<loc>https://armoredcode.com/blog/ghost-in-the-shell-an-exploiting-attempt-examinated/</loc>
<lastmod>2012-05-23T07:51:00+00:00</lastmod>
</url>
<url>
<loc>https://armoredcode.com/blog/am-i-the-sandman/</loc>
<lastmod>2012-05-30T07:53:00+00:00</lastmod>
</url>
<url>
<loc>https://armoredcode.com/blog/cve-2012-2661-sqlinjection-on-rails/</loc>
<lastmod>2012-06-04T08:22:00+00:00</lastmod>
</url>
<url>
<loc>https://armoredcode.com/blog/leakedin-and-the-salt-and-pepper-sauce/</loc>
<lastmod>2012-06-07T17:17:00+00:00</lastmod>
</url>
<url>
<loc>https://armoredcode.com/blog/some-security-tips-for-ruby-hackers-prelude/</loc>
<lastmod>2012-06-12T08:05:00+00:00</lastmod>
</url>
<url>
<loc>https://armoredcode.com/blog/some-security-tips-for-ruby-hackers-leveraging-the-attack-surface-part-1/</loc>
<lastmod>2012-06-13T17:25:00+00:00</lastmod>
</url>
<url>
<loc>https://armoredcode.com/blog/what-i-learnt-from-italian-rubyday/</loc>
<lastmod>2012-06-15T15:40:00+00:00</lastmod>
</url>
<url>
<loc>https://armoredcode.com/blog/some-security-tips-for-ruby-hackers-leveraging-the-attack-surface-part-2/</loc>
<lastmod>2012-06-27T07:57:00+00:00</lastmod>
</url>
<url>
<loc>https://armoredcode.com/blog/testing-your-cookies-attributes-for-insecurities-using-ruby/</loc>
<lastmod>2012-07-05T07:42:00+00:00</lastmod>
</url>
<url>
<loc>https://armoredcode.com/blog/which-is-the-most-secure-programming-language-ever/</loc>
<lastmod>2012-07-11T08:34:00+00:00</lastmod>
</url>
<url>
<loc>https://armoredcode.com/blog/fingerprinting-cmses-under-the-moonlight/</loc>
<lastmod>2012-07-16T08:46:00+00:00</lastmod>
</url>
<url>
<loc>https://armoredcode.com/blog/penetration-testing-with-ruby-fingerprinting-your-target/</loc>
<lastmod>2012-07-19T08:01:00+00:00</lastmod>
</url>
<url>
<loc>https://armoredcode.com/blog/build-an-api-for-fun-with-grape/</loc>
<lastmod>2012-07-24T08:39:00+00:00</lastmod>
</url>
<url>
<loc>https://armoredcode.com/blog/5-excuses-you-wont-tell-your-self-for-not-practicing-tdd/</loc>
<lastmod>2012-07-26T08:36:00+00:00</lastmod>
</url>
<url>
<loc>https://armoredcode.com/blog/anti-aliasing-in-ruby-attribute-assignment-and-a-tdd-session/</loc>
<lastmod>2012-08-04T14:50:00+00:00</lastmod>
</url>
<url>
<loc>https://armoredcode.com/blog/armorize-your-rack-stacktrace-for-debug-purposes/</loc>
<lastmod>2012-08-14T16:08:00+00:00</lastmod>
</url>
<url>
<loc>https://armoredcode.com/blog/use-the-nexpose-api-to-add-a-search-by-ip-functionality-in-your-tools/</loc>
<lastmod>2012-08-24T09:04:00+00:00</lastmod>
</url>
<url>
<loc>https://armoredcode.com/blog/lovely-tips-string-starting-with-a-pattern-and-timeframe-duration-like-gents/</loc>
<lastmod>2012-08-27T09:24:00+00:00</lastmod>
</url>
<url>
<loc>https://armoredcode.com/blog/create-an-highlight-octopress-plugin/</loc>
<lastmod>2012-08-28T08:31:00+00:00</lastmod>
</url>
<url>
<loc>https://armoredcode.com/blog/enabling-related-post-on-octopress-and-mac-os-x/</loc>
<lastmod>2012-08-29T09:27:00+00:00</lastmod>
</url>
<url>
<loc>https://armoredcode.com/blog/they-are-tracking-at-you-pt-dot-1/</loc>
<lastmod>2012-09-07T10:05:00+00:00</lastmod>
</url>
<url>
<loc>https://armoredcode.com/blog/between-pentesting-and-entrepreneurship/</loc>
<lastmod>2012-09-14T08:52:00+00:00</lastmod>
</url>
<url>
<loc>https://armoredcode.com/blog/when-you-realize-youre-doing-threat-modeling/</loc>
<lastmod>2012-09-18T08:41:00+00:00</lastmod>
</url>
<url>
<loc>https://armoredcode.com/blog/the-first-and-last-post-about-codesake-dot-com/</loc>
<lastmod>2012-09-26T08:39:00+00:00</lastmod>
</url>
<url>
<loc>https://armoredcode.com/blog/cfp-open-for-next-owasp-italy-day-2012/</loc>
<lastmod>2012-10-04T09:09:00+00:00</lastmod>
</url>
<url>
<loc>https://armoredcode.com/blog/pony-and-the-empty-emails-bug/</loc>
<lastmod>2012-10-08T08:03:00+00:00</lastmod>
</url>
<url>
<loc>https://armoredcode.com/blog/parsing-cvss-vector-and-publishing-as-api/</loc>
<lastmod>2012-10-09T13:01:00+00:00</lastmod>
</url>
<url>
<loc>https://armoredcode.com/blog/are-web-agencies-the-new-security-threats-in-2013/</loc>
<lastmod>2012-10-22T07:50:00+00:00</lastmod>
</url>
<url>
<loc>https://armoredcode.com/blog/adding-basic-authentication-support-to-wpscan/</loc>
<lastmod>2012-10-23T09:10:00+00:00</lastmod>
</url>
<url>
<loc>https://armoredcode.com/blog/the-hidden-pitfalls-in-automatic-source-code-review/</loc>
<lastmod>2012-10-28T09:02:00+00:00</lastmod>
</url>
<url>
<loc>https://armoredcode.com/blog/border-line-between-marketing-and-security-features/</loc>
<lastmod>2012-11-05T09:00:00+00:00</lastmod>
</url>
<url>
<loc>https://armoredcode.com/blog/the-fragile-internet/</loc>
<lastmod>2012-11-06T07:55:00+00:00</lastmod>
</url>
<url>
<loc>https://armoredcode.com/blog/untold-owasp-orizon-is-died-and-im-sad-of-it/</loc>
<lastmod>2012-11-20T07:54:00+00:00</lastmod>
</url>
<url>
<loc>https://armoredcode.com/blog/crafting-an-authentication-subsystem-that-rocks-for-your-padrino-application-with-omniauth/</loc>
<lastmod>2012-11-21T08:26:00+00:00</lastmod>
</url>
<url>
<loc>https://armoredcode.com/blog/use-the-nexpose-api-to-automate-report-generation-and-download/</loc>
<lastmod>2012-11-30T07:53:00+00:00</lastmod>
</url>
<url>
<loc>https://armoredcode.com/blog/driven-by-real-world-task-code-reviewing-jsp-using-regular-expression/</loc>
<lastmod>2012-12-03T18:45:00+00:00</lastmod>
</url>
<url>
<loc>https://armoredcode.com/blog/bypassing-http-basic-authentication-in-php-application-nominated-as-hacking-technique-for-2012/</loc>
<lastmod>2012-12-13T07:51:00+00:00</lastmod>
</url>
<url>
<loc>https://armoredcode.com/blog/codesake-engine-and-two-weeks-of-bdd-development/</loc>
<lastmod>2012-12-23T09:00:00+00:00</lastmod>
</url>
<url>
<loc>https://armoredcode.com/blog/cve-2012-5664-sql-injection-on-rails-dot-dot-dot-again/</loc>
<lastmod>2013-01-04T09:00:00+00:00</lastmod>
</url>
<url>
<loc>https://armoredcode.com/blog/defending-yourself-is-not-a-crime/</loc>
<lastmod>2013-01-11T07:56:00+00:00</lastmod>
</url>
<url>
<loc>https://armoredcode.com/blog/is-vulnerability-management-a-buzz-word/</loc>
<lastmod>2013-01-23T08:06:00+00:00</lastmod>
</url>
<url>
<loc>https://armoredcode.com/blog/exploiting-ssh-weak-passwords-the-ruby-way/</loc>
<lastmod>2013-02-15T08:08:00+00:00</lastmod>
</url>
<url>
<loc>https://armoredcode.com/blog/ruby-on-rails-cheatsheet-the-review/</loc>
<lastmod>2013-03-05T09:50:00+00:00</lastmod>
</url>
<url>
<loc>https://armoredcode.com/blog/creating-awereness-on-an-hostile-environment/</loc>
<lastmod>2013-03-12T07:57:00+00:00</lastmod>
</url>
<url>
<loc>https://armoredcode.com/blog/happy-birthday-armoredcode-and-4-rails-advisories/</loc>
<lastmod>2013-03-18T18:45:00+00:00</lastmod>
</url>
<url>
<loc>https://armoredcode.com/blog/untold-nobody-will-make-a-cinema-story-over-this-blog-and-im-fine/</loc>
<lastmod>2013-04-11T07:57:00+00:00</lastmod>
</url>
<url>
<loc>https://armoredcode.com/blog/being-nervous-and-anxious-before-a-talk/</loc>
<lastmod>2013-04-17T08:16:00+00:00</lastmod>
</url>
<url>
<loc>https://armoredcode.com/blog/i-dont-if-app-is-unsecure-its-friday-im-in-love/</loc>
<lastmod>2013-04-19T07:59:00+00:00</lastmod>
</url>
<url>
<loc>https://armoredcode.com/blog/railsberry-chronicles-day-0-the-trip/</loc>
<lastmod>2013-04-21T15:46:00+00:00</lastmod>
</url>
<url>
<loc>https://armoredcode.com/blog/railsberry-chronicles-day-1-the-unerdware-experiment/</loc>
<lastmod>2013-04-22T23:06:00+00:00</lastmod>
</url>
<url>
<loc>https://armoredcode.com/blog/railsberry-chronicles-day-2-the-english-penetration-test-eventually-the-day-i-talk-to-450-plus-oustanding-developers/</loc>
<lastmod>2013-04-23T14:50:00+00:00</lastmod>
</url>
<url>
<loc>https://armoredcode.com/blog/codesake-dawn-the-new-security-source-code-scanner-for-ruby/</loc>
<lastmod>2013-05-29T08:24:00+00:00</lastmod>
</url>
<url>
<loc>https://armoredcode.com/blog/do-you-trust-you-vulnerability-assessment/</loc>
<lastmod>2013-06-21T08:01:00+00:00</lastmod>
</url>
<url>
<loc>https://armoredcode.com/blog/the-owasp-european-tour-2013-hits-italy-27-28-june-2013/</loc>
<lastmod>2013-06-24T14:50:00+00:00</lastmod>
</url>
<url>
<loc>https://armoredcode.com/blog/create-a-bot-engine-in-ruby-the-botolo-project/</loc>
<lastmod>2013-06-28T08:00:00+00:00</lastmod>
</url>
<url>
<loc>https://armoredcode.com/blog/when-the-vulnerability-is-not-the-vulnerability-itself/</loc>
<lastmod>2013-07-18T07:56:00+00:00</lastmod>
</url>
<url>
<loc>https://armoredcode.com/blog/how-to-quote-a-code-review/</loc>
<lastmod>2013-07-29T09:00:00+00:00</lastmod>
</url>
<url>
<loc>https://armoredcode.com/blog/create-a-quick-and-dirty-web-crawler-with-ruby/</loc>
<lastmod>2013-07-30T07:58:00+00:00</lastmod>
</url>
<url>
<loc>https://armoredcode.com/blog/tales-from-a-login-page-intro/</loc>
<lastmod>2013-08-08T15:22:00+00:00</lastmod>
</url>
<url>
<loc>https://armoredcode.com/blog/tales-from-a-login-page-exploit-the-form/</loc>
<lastmod>2013-09-03T07:50:00+00:00</lastmod>
</url>
<url>
<loc>https://armoredcode.com/blog/howto-crawl-web-dot-xml-with-ruby-to-discover-servlet-urls-for-a-pentest/</loc>
<lastmod>2013-09-05T09:00:00+00:00</lastmod>
</url>
<url>
<loc>https://armoredcode.com/blog/now-im-on-blogloving/</loc>
<lastmod>2013-09-12T15:32:00+00:00</lastmod>
</url>
<url>
<loc>https://armoredcode.com/blog/solid-as-diamond-talk-in-fiera-della-tecnolgia-ict-fair/</loc>
<lastmod>2013-09-18T18:00:00+00:00</lastmod>
</url>
<url>
<loc>https://armoredcode.com/blog/fingerprint-phpbb-forum-platform/</loc>
<lastmod>2013-09-26T08:06:00+00:00</lastmod>
</url>
<url>
<loc>https://armoredcode.com/blog/create-random-keys-in-ruby-using-securerandom/</loc>
<lastmod>2013-10-15T08:10:00+00:00</lastmod>
</url>
<url>
<loc>https://armoredcode.com/blog/we-need-a-standard-that-eventually-we-wont-follow/</loc>
<lastmod>2013-10-22T08:27:00+00:00</lastmod>
</url>
<url>
<loc>https://armoredcode.com/blog/how-to-generate-bruteforce-friendly-strings/</loc>
<lastmod>2013-11-18T07:59:00+00:00</lastmod>
</url>
<url>
<loc>https://armoredcode.com/blog/let-the-sake-for-code-to-flow/</loc>
<lastmod>2013-11-18T18:37:00+00:00</lastmod>
</url>
<url>
<loc>https://armoredcode.com/blog/ruby-and-omniauth-facebook-gem-security-issues-this-week/</loc>
<lastmod>2013-11-26T08:39:00+00:00</lastmod>
</url>
<url>
<loc>https://armoredcode.com/blog/updates-from-the-ruby-security-world-6-new-vulnerabilities-as-xmas-gift/</loc>
<lastmod>2013-12-11T08:01:00+00:00</lastmod>
</url>
<url>
<loc>https://armoredcode.com/blog/every-bug-has-a-sad/</loc>
<lastmod>2014-01-24T08:01:00+00:00</lastmod>
</url>
<url>
<loc>https://armoredcode.com/blog/how-to-wrap-a-long-text-to-fit-your-terminal-width-in-ruby/</loc>
<lastmod>2014-01-31T08:20:00+00:00</lastmod>
</url>
<url>
<loc>https://armoredcode.com/blog/rails-patching-wednesday/</loc>
<lastmod>2014-02-19T07:49:00+00:00</lastmod>
</url>
<url>
<loc>https://armoredcode.com/blog/hello-world-dot-dot-dot-again/</loc>
<lastmod>2018-09-24T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://armoredcode.com/blog/a-cracking-the-perimeter-journey-0-the-beginning/</loc>
<lastmod>2018-12-28T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://armoredcode.com/blog/a-cracking-the-perimeter-journey-1-my-own-lab/</loc>
<lastmod>2019-01-01T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://armoredcode.com/blog/the-shellerate-project-yet-another-framework-for-shellcode-generation/</loc>
<lastmod>2019-01-08T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://armoredcode.com/blog/how-to-calculate-your-network-address-in-cidr-notation/</loc>
<lastmod>2019-01-15T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://armoredcode.com/blog/getting-root-matrix/</loc>
<lastmod>2019-01-28T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://armoredcode.com/blog/digging-into-vulnserver-fuzzing-it/</loc>
<lastmod>2019-02-15T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://armoredcode.com/blog/a-closer-look-to-msf-egghunter/</loc>
<lastmod>2019-02-22T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://armoredcode.com/blog/backflip-into-the-stack/</loc>
<lastmod>2019-03-19T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://armoredcode.com/blog/how-an-excercise-eventually-becomes-my-first-public-exploit/</loc>
<lastmod>2019-03-26T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://armoredcode.com/blog/create-your-own-telemetry-system/</loc>
<lastmod>2019-04-17T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://armoredcode.com/blog/a-tale-of-a-restricted-charset-shellcode-generation/</loc>
<lastmod>2019-04-19T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://armoredcode.com/blog/why-most-security-tools-are-lying-to-you/</loc>
<lastmod>2026-01-08T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://armoredcode.com/blog/why-most-security-findings-are-misunderstood/</loc>
<lastmod>2026-01-13T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://armoredcode.com/blog/aggregating-semgrep-results-mvp-demo/</loc>
<lastmod>2026-01-26T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://armoredcode.com/blog/soak-deep-tissue-static-analysis-as-an-execution-layer/</loc>
<lastmod>2026-02-15T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://armoredcode.com/blog/signal-engine-0.3.0-from-findings-to-signal/</loc>
<lastmod>2026-03-24T00:00:00+00:00</lastmod>
</url>
<url>
<loc>https://armoredcode.com/blog/</loc>
</url>
<url>
<loc>https://armoredcode.com/</loc>
</url>
</urlset>
