<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="wordpress.com" -->
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd"><url><loc>https://blog.qdsecurity.se/2024/04/07/forest-compromise-through-ama-abuse/</loc><image:image><image:loc>https://blog.qdsecurity.se/wp-content/uploads/2024/04/image-24.png</image:loc><image:title>image-24</image:title></image:image><image:image><image:loc>https://blog.qdsecurity.se/wp-content/uploads/2024/04/image-23.png</image:loc><image:title>image-23</image:title></image:image><image:image><image:loc>https://blog.qdsecurity.se/wp-content/uploads/2024/04/image-22.png</image:loc><image:title>image-22</image:title></image:image><image:image><image:loc>https://blog.qdsecurity.se/wp-content/uploads/2024/04/image-21.png</image:loc><image:title>image-21</image:title></image:image><image:image><image:loc>https://blog.qdsecurity.se/wp-content/uploads/2024/04/image-20.png</image:loc><image:title>image-20</image:title></image:image><image:image><image:loc>https://blog.qdsecurity.se/wp-content/uploads/2024/04/image-19.png</image:loc><image:title>image-19</image:title></image:image><image:image><image:loc>https://blog.qdsecurity.se/wp-content/uploads/2024/04/image-18.png</image:loc><image:title>image-18</image:title></image:image><image:image><image:loc>https://blog.qdsecurity.se/wp-content/uploads/2024/04/image-17.png</image:loc><image:title>image-17</image:title></image:image><image:image><image:loc>https://blog.qdsecurity.se/wp-content/uploads/2024/04/image-16.png</image:loc><image:title>image-16</image:title></image:image><image:image><image:loc>https://blog.qdsecurity.se/wp-content/uploads/2024/04/image-15.png</image:loc><image:title>image-15</image:title></image:image><lastmod>2024-04-10T16:48:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.qdsecurity.se/2020/09/04/supply-in-the-request-shenanigans/</loc><lastmod>2024-04-07T14:54:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.qdsecurity.se/2022/05/27/manually-injecting-a-sid-in-a-certificate/</loc><image:image><image:loc>https://blog.qdsecurity.se/wp-content/uploads/2022/05/image-14.png</image:loc><image:title>image-14</image:title></image:image><image:image><image:loc>https://blog.qdsecurity.se/wp-content/uploads/2022/05/image-13.png</image:loc><image:title>image-13</image:title></image:image><image:image><image:loc>https://blog.qdsecurity.se/wp-content/uploads/2022/05/image-12.png</image:loc><image:title>image-12</image:title></image:image><image:image><image:loc>https://blog.qdsecurity.se/wp-content/uploads/2022/05/image-11.png</image:loc><image:title>image-11</image:title></image:image><image:image><image:loc>https://blog.qdsecurity.se/wp-content/uploads/2022/05/image-10.png</image:loc><image:title>image-10</image:title></image:image><image:image><image:loc>https://blog.qdsecurity.se/wp-content/uploads/2022/05/image-9.png</image:loc><image:title>image-9</image:title></image:image><image:image><image:loc>https://blog.qdsecurity.se/wp-content/uploads/2022/05/image-8.png</image:loc><image:title>image-8</image:title></image:image><image:image><image:loc>https://blog.qdsecurity.se/wp-content/uploads/2022/05/image-7.png</image:loc><image:title>image-7</image:title></image:image><image:image><image:loc>https://blog.qdsecurity.se/wp-content/uploads/2022/05/image-6.png</image:loc><image:title>image-6</image:title></image:image><image:image><image:loc>https://blog.qdsecurity.se/wp-content/uploads/2022/05/image-5.png</image:loc><image:title>image-5</image:title></image:image><lastmod>2022-08-11T17:00:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.qdsecurity.se/2021/05/29/remote-desktop-mfa-network-level-authentication-and-kdc-proxy/</loc><lastmod>2023-11-22T08:02:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.qdsecurity.se/2020/08/12/bypassing-wia-on-adfs/</loc><lastmod>2020-08-14T08:52:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.qdsecurity.se/contact/</loc><lastmod>2020-07-17T09:57:19+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://blog.qdsecurity.se/about/</loc><lastmod>2020-07-17T09:55:01+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://blog.qdsecurity.se</loc><changefreq>daily</changefreq><priority>1.0</priority><lastmod>2024-04-10T16:48:16+00:00</lastmod></url></urlset>
