<?xml version="1.0" encoding="utf-8" standalone="yes"?><urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml"><url><loc>https://bitsdeep.com/</loc><lastmod>2024-09-10T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>0.5</priority></url><url><loc>https://bitsdeep.com/posts/fcsc-2024-write-ups-for-the-crypto-challenges/</loc><lastmod>2024-09-10T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>0.5</priority></url><url><loc>https://bitsdeep.com/posts/</loc><lastmod>2024-09-10T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>0.5</priority></url><url><loc>https://bitsdeep.com/projects/python-random-prediction/</loc><lastmod>2024-04-22T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>0.5</priority></url><url><loc>https://bitsdeep.com/projects/</loc><lastmod>2024-04-22T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>0.5</priority></url><url><loc>https://bitsdeep.com/posts/kalmarctf-2024-one-key-to-rule-them-all/</loc><lastmod>2024-03-18T23:04:35+00:00</lastmod><changefreq>daily</changefreq><priority>0.5</priority></url><url><loc>https://bitsdeep.com/projects/android-manifest-anomaly-detector/</loc><lastmod>2022-10-11T00:00:00+00:00</lastmod><changefreq>daily</changefreq><priority>0.5</priority></url><url><loc>https://bitsdeep.com/posts/fcsc-2022-write-ups-for-some-of-the-crypto-challenges/</loc><lastmod>2022-05-19T19:34:04+00:00</lastmod><changefreq>daily</changefreq><priority>0.5</priority></url><url><loc>https://bitsdeep.com/posts/fcsc-2021-write-ups-for-the-crypto-challenges/</loc><lastmod>2021-05-03T16:00:49+00:00</lastmod><changefreq>daily</changefreq><priority>0.5</priority></url><url><loc>https://bitsdeep.com/posts/analysis-of-the-roca-vulnerability/</loc><lastmod>2020-05-04T11:20:00+00:00</lastmod><changefreq>daily</changefreq><priority>0.5</priority></url><url><loc>https://bitsdeep.com/posts/solving-re-tasks-the-crypto-way/</loc><lastmod>2019-08-19T08:45:14+00:00</lastmod><changefreq>daily</changefreq><priority>0.5</priority></url><url><loc>https://bitsdeep.com/posts/attacking-rsa-for-fun-and-ctf-points-part-4/</loc><lastmod>2019-06-27T08:19:05+00:00</lastmod><changefreq>daily</changefreq><priority>0.5</priority></url><url><loc>https://bitsdeep.com/posts/analysing-the-worst-ransomware-part-4/</loc><lastmod>2018-09-26T11:12:59+00:00</lastmod><changefreq>daily</changefreq><priority>0.5</priority></url><url><loc>https://bitsdeep.com/posts/analysing-the-worst-ransomware-part-3/</loc><lastmod>2018-09-26T11:11:21+00:00</lastmod><changefreq>daily</changefreq><priority>0.5</priority></url><url><loc>https://bitsdeep.com/posts/analysing-the-worst-ransomware-part-2/</loc><lastmod>2018-09-26T11:10:52+00:00</lastmod><changefreq>daily</changefreq><priority>0.5</priority></url><url><loc>https://bitsdeep.com/posts/analysing-the-worst-ransomware-part-1/</loc><lastmod>2018-09-26T11:09:40+00:00</lastmod><changefreq>daily</changefreq><priority>0.5</priority></url><url><loc>https://bitsdeep.com/posts/attacking-rsa-for-fun-and-ctf-points-part-3/</loc><lastmod>2018-07-15T17:24:33+00:00</lastmod><changefreq>daily</changefreq><priority>0.5</priority></url><url><loc>https://bitsdeep.com/posts/attacking-rsa-for-fun-and-ctf-points-part-2/</loc><lastmod>2018-05-25T17:37:59+00:00</lastmod><changefreq>daily</changefreq><priority>0.5</priority></url><url><loc>https://bitsdeep.com/posts/attacking-rsa-for-fun-and-ctf-points-part-1/</loc><lastmod>2018-04-13T14:00:31+00:00</lastmod><changefreq>daily</changefreq><priority>0.5</priority></url><url><loc>https://bitsdeep.com/posts/easyctf-iv-special-endings/</loc><lastmod>2018-02-21T16:24:16+00:00</lastmod><changefreq>daily</changefreq><priority>0.5</priority></url><url><loc>https://bitsdeep.com/posts/easyctf-iv-soupstitution/</loc><lastmod>2018-02-21T15:22:04+00:00</lastmod><changefreq>daily</changefreq><priority>0.5</priority></url><url><loc>https://bitsdeep.com/posts/easyctf-iv-rsa-v/</loc><lastmod>2018-02-21T14:20:07+00:00</lastmod><changefreq>daily</changefreq><priority>0.5</priority></url><url><loc>https://bitsdeep.com/posts/easyctf-iv-not-otp/</loc><lastmod>2018-02-21T13:23:12+00:00</lastmod><changefreq>daily</changefreq><priority>0.5</priority></url><url><loc>https://bitsdeep.com/posts/easyctf-iv-recap/</loc><lastmod>2018-02-21T12:25:14+00:00</lastmod><changefreq>daily</changefreq><priority>0.5</priority></url><url><loc>https://bitsdeep.com/posts/hackim18-web2/</loc><lastmod>2018-02-13T22:04:30+00:00</lastmod><changefreq>daily</changefreq><priority>0.5</priority></url><url><loc>https://bitsdeep.com/posts/hackim18-web1/</loc><lastmod>2018-02-13T22:01:20+00:00</lastmod><changefreq>daily</changefreq><priority>0.5</priority></url><url><loc>https://bitsdeep.com/posts/hackim18-what-did-he-said/</loc><lastmod>2018-02-13T21:10:23+00:00</lastmod><changefreq>daily</changefreq><priority>0.5</priority></url><url><loc>https://bitsdeep.com/posts/nullcom-hackim-2018-recap/</loc><lastmod>2018-02-13T19:17:01+00:00</lastmod><changefreq>daily</changefreq><priority>0.5</priority></url><url><loc>https://bitsdeep.com/projects/linked-pixel-steganography/</loc><lastmod>2018-02-02T00:00:58+00:00</lastmod><changefreq>daily</changefreq><priority>0.5</priority></url><url><loc>https://bitsdeep.com/posts/the-beginning/</loc><lastmod>2018-01-30T13:53:26+00:00</lastmod><changefreq>daily</changefreq><priority>0.5</priority></url><url><loc>https://bitsdeep.com/about-me/</loc><lastmod>2018-01-30T12:58:31+00:00</lastmod><changefreq>daily</changefreq><priority>0.5</priority></url></urlset>