<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="wordpress.com" -->
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd"><url><loc>https://bohops.com/2023/11/27/abusing-net-core-clr-diagnostic-features-cve-2023-33127/</loc><image:image><image:loc>https://bohops.com/wp-content/uploads/2023/11/image-14.png</image:loc><image:title>image-14</image:title></image:image><image:image><image:loc>https://bohops.com/wp-content/uploads/2023/11/image-13.png</image:loc><image:title>image-13</image:title></image:image><image:image><image:loc>https://bohops.com/wp-content/uploads/2023/11/image-12.png</image:loc><image:title>image-12</image:title></image:image><image:image><image:loc>https://bohops.com/wp-content/uploads/2023/11/image-11.png</image:loc><image:title>image-11</image:title></image:image><image:image><image:loc>https://bohops.com/wp-content/uploads/2023/11/image-10.png</image:loc><image:title>image-10</image:title></image:image><image:image><image:loc>https://bohops.com/wp-content/uploads/2023/11/image-9.png</image:loc><image:title>image-9</image:title></image:image><image:image><image:loc>https://bohops.com/wp-content/uploads/2023/11/image-8.png</image:loc><image:title>image-8</image:title></image:image><image:image><image:loc>https://bohops.com/wp-content/uploads/2023/11/image-7.png</image:loc><image:title>image-7</image:title></image:image><image:image><image:loc>https://bohops.com/wp-content/uploads/2023/11/image-6.png</image:loc><image:title>image-6</image:title></image:image><image:image><image:loc>https://bohops.com/wp-content/uploads/2023/11/image-5.png</image:loc><image:title>image-5</image:title></image:image><lastmod>2023-11-27T13:14:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://bohops.com/2023/06/09/no-alloc-no-problem-leveraging-program-entry-points-for-process-injection/</loc><image:image><image:loc>https://bohops.com/wp-content/uploads/2023/06/image-20.png</image:loc><image:title>image-20</image:title></image:image><image:image><image:loc>https://bohops.com/wp-content/uploads/2023/06/image-19.png</image:loc><image:title>image-19</image:title></image:image><image:image><image:loc>https://bohops.com/wp-content/uploads/2023/06/image-18.png</image:loc><image:title>image-18</image:title></image:image><image:image><image:loc>https://bohops.com/wp-content/uploads/2023/06/image-17.png</image:loc><image:title>image-17</image:title></image:image><image:image><image:loc>https://bohops.com/wp-content/uploads/2023/06/image-16.png</image:loc><image:title>image-16</image:title></image:image><image:image><image:loc>https://bohops.com/wp-content/uploads/2023/06/image-15.png</image:loc><image:title>image-15</image:title></image:image><image:image><image:loc>https://bohops.com/wp-content/uploads/2023/06/image-14.png</image:loc><image:title>image-14</image:title></image:image><image:image><image:loc>https://bohops.com/wp-content/uploads/2023/06/image-13.png</image:loc><image:title>image-13</image:title></image:image><image:image><image:loc>https://bohops.com/wp-content/uploads/2023/06/image-12.png</image:loc><image:title>image-12</image:title></image:image><image:image><image:loc>https://bohops.com/wp-content/uploads/2023/06/image-11.png</image:loc><image:title>image-11</image:title></image:image><lastmod>2023-06-09T00:53:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://bohops.com/2017/12/02/trust-direction-an-enabler-for-active-directory-enumeration-and-trust-exploitation/</loc><image:image><image:loc>https://bohops.com/wp-content/uploads/2017/12/uc2_51.png</image:loc><image:title>uc2_5</image:title></image:image><image:image><image:loc>https://bohops.com/wp-content/uploads/2017/12/uc2_41.png</image:loc><image:title>uc2_4</image:title></image:image><image:image><image:loc>https://bohops.com/wp-content/uploads/2017/12/uc2_31.png</image:loc><image:title>uc2_3</image:title></image:image><image:image><image:loc>https://bohops.com/wp-content/uploads/2017/12/uc2_21.png</image:loc><image:title>uc2_2</image:title></image:image><image:image><image:loc>https://bohops.com/wp-content/uploads/2017/12/uc2_11.png</image:loc><image:title>uc2_1</image:title></image:image><image:image><image:loc>https://bohops.com/wp-content/uploads/2017/12/uc1_51.png</image:loc><image:title>uc1_5</image:title></image:image><image:image><image:loc>https://bohops.com/wp-content/uploads/2017/12/uc1_41.png</image:loc><image:title>uc1_4</image:title></image:image><image:image><image:loc>https://bohops.com/wp-content/uploads/2017/12/uc1_31.png</image:loc><image:title>uc1_3</image:title></image:image><image:image><image:loc>https://bohops.com/wp-content/uploads/2017/12/uc1_21.png</image:loc><image:title>uc1_2</image:title></image:image><image:image><image:loc>https://bohops.com/wp-content/uploads/2017/12/uc1_11.png</image:loc><image:title>uc1_1</image:title></image:image><lastmod>2022-12-15T12:17:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://bohops.com/2017/12/02/clickonce-twice-or-thrice-a-technique-for-social-engineering-and-untrusted-command-execution/</loc><image:image><image:loc>https://bohops.com/wp-content/uploads/2017/12/win10_07.png</image:loc><image:title>Win10_07</image:title></image:image><image:image><image:loc>https://bohops.com/wp-content/uploads/2017/12/win10_06.png</image:loc><image:title>Win10_06</image:title></image:image><image:image><image:loc>https://bohops.com/wp-content/uploads/2017/12/win10_05.png</image:loc><image:title>Win10_05</image:title></image:image><image:image><image:loc>https://bohops.com/wp-content/uploads/2017/12/win10_04.png</image:loc><image:title>Win10_04</image:title></image:image><image:image><image:loc>https://bohops.com/wp-content/uploads/2017/12/win10_03.png</image:loc><image:title>Win10_03</image:title></image:image><image:image><image:loc>https://bohops.com/wp-content/uploads/2017/12/win10_02.png</image:loc><image:title>Win10_02</image:title></image:image><image:image><image:loc>https://bohops.com/wp-content/uploads/2017/12/win10_01.png</image:loc><image:title>Win10_01</image:title></image:image><image:image><image:loc>https://bohops.com/wp-content/uploads/2017/12/win7_05.png</image:loc><image:title>win7_05</image:title></image:image><image:image><image:loc>https://bohops.com/wp-content/uploads/2017/12/win7_04.png</image:loc><image:title>win7_04</image:title></image:image><image:image><image:loc>https://bohops.com/wp-content/uploads/2017/12/win7_03.png</image:loc><image:title>win7_03</image:title></image:image><lastmod>2022-12-15T12:15:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://bohops.com/2018/01/07/executing-commands-and-bypassing-applocker-with-powershell-diagnostic-scripts/</loc><image:image><image:loc>https://bohops.com/wp-content/uploads/2018/01/bypass_applocker.png</image:loc><image:title>bypass_applocker</image:title></image:image><image:image><image:loc>https://bohops.com/wp-content/uploads/2018/01/ps2_load_assembly.png</image:loc><image:title>ps2_load_assembly</image:title></image:image><image:image><image:loc>https://bohops.com/wp-content/uploads/2018/01/ps5_cl_prevention.png</image:loc><image:title>ps5_cl_prevention</image:title></image:image><image:image><image:loc>https://bohops.com/wp-content/uploads/2018/01/applocker_policy_psv2.png</image:loc><image:title>applocker_policy_psv2</image:title></image:image><image:image><image:loc>https://bohops.com/wp-content/uploads/2018/01/applocker_policy.png</image:loc><image:title>applocker_policy</image:title></image:image><image:image><image:loc>https://bohops.com/wp-content/uploads/2018/01/funrun.png</image:loc><image:title>funrun</image:title></image:image><image:image><image:loc>https://bohops.com/wp-content/uploads/2018/01/subtee_tweet.png</image:loc><image:title>subtee_tweet</image:title></image:image><image:image><image:loc>https://bohops.com/wp-content/uploads/2018/01/cl_invocation.jpg</image:loc><image:title>cl_invocation</image:title></image:image><lastmod>2022-12-15T12:13:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://bohops.com/2018/01/23/loading-alternate-data-stream-ads-dll-cpl-binaries-to-bypass-applocker/</loc><image:image><image:loc>https://bohops.com/wp-content/uploads/2018/01/cpl_success.png</image:loc><image:title>cpl_success</image:title></image:image><image:image><image:loc>https://bohops.com/wp-content/uploads/2018/01/cpl_failed_to_run.png</image:loc><image:title>cpl_failed_to_run</image:title></image:image><image:image><image:loc>https://bohops.com/wp-content/uploads/2018/01/create_cpl_task.png</image:loc><image:title>create_cpl_task</image:title></image:image><image:image><image:loc>https://bohops.com/wp-content/uploads/2018/01/visual_studio.png</image:loc><image:title>visual_studio</image:title></image:image><image:image><image:loc>https://bohops.com/wp-content/uploads/2018/01/control_strings.png</image:loc><image:title>control_strings</image:title></image:image><image:image><image:loc>https://bohops.com/wp-content/uploads/2018/01/hexacorn_cpl.png</image:loc><image:title>hexacorn_cpl</image:title></image:image><image:image><image:loc>https://bohops.com/wp-content/uploads/2018/01/create_file1.png</image:loc><image:title>create_file</image:title></image:image><image:image><image:loc>https://bohops.com/wp-content/uploads/2018/01/control_dll_bypass.jpg</image:loc><image:title>control_dll_bypass</image:title></image:image><image:image><image:loc>https://bohops.com/wp-content/uploads/2018/01/applocker_image.png</image:loc><image:title>applocker_image</image:title></image:image><image:image><image:loc>https://bohops.com/wp-content/uploads/2018/01/windows_permissions.png</image:loc><image:title>windows_permissions</image:title></image:image><lastmod>2022-12-15T12:10:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://bohops.com/2018/01/31/vsto-the-payload-installer-that-probably-defeats-your-application-whitelisting-rules/</loc><image:image><image:loc>https://bohops.com/wp-content/uploads/2018/01/vsto_7_publish_settings1.png</image:loc><image:title>vsto_7_publish_settings</image:title></image:image><image:image><image:loc>https://bohops.com/wp-content/uploads/2018/01/vsto_9_compiled_released1.png</image:loc><image:title>vsto_9_compiled_released</image:title></image:image><image:image><image:loc>https://bohops.com/wp-content/uploads/2018/01/vsto_3_add_payload1.png</image:loc><image:title>vsto_3_add_payload</image:title></image:image><image:image><image:loc>https://bohops.com/wp-content/uploads/2018/01/vsto_12_opening_word.png</image:loc><image:title>vsto_12_opening_word</image:title></image:image><image:image><image:loc>https://bohops.com/wp-content/uploads/2018/01/vsto_11_running_on_target.png</image:loc><image:title>vsto_11_running_on_target</image:title></image:image><image:image><image:loc>https://bohops.com/wp-content/uploads/2018/01/vsto_10_applocker_enforcement.png</image:loc><image:title>vsto_10_applocker_enforcement</image:title></image:image><image:image><image:loc>https://bohops.com/wp-content/uploads/2018/01/vsto_5_sign_manifest_for_install.png</image:loc><image:title>vsto_5_sign_manifest_for_install</image:title></image:image><image:image><image:loc>https://bohops.com/wp-content/uploads/2018/01/vsto_4_open_project_properties.png</image:loc><image:title>vsto_4_open_project_properties</image:title></image:image><image:image><image:loc>https://bohops.com/wp-content/uploads/2018/01/vsto_1_create_project.png</image:loc><image:title>vsto_1_create_project</image:title></image:image><lastmod>2022-12-15T12:09:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://bohops.com/2018/02/10/vshadow-abusing-the-volume-shadow-service-for-evasion-persistence-and-active-directory-database-extraction/</loc><image:image><image:loc>https://bohops.com/wp-content/uploads/2018/02/middle-earth-shadow-of-mordor.jpg</image:loc><image:title>Middle-earth-Shadow-of-Mordor</image:title></image:image><image:image><image:loc>https://bohops.com/wp-content/uploads/2018/02/secretsdump.png</image:loc><image:title>secretsdump</image:title></image:image><image:image><image:loc>https://bohops.com/wp-content/uploads/2018/02/vshadow_delete.png</image:loc><image:title>vshadow_delete</image:title></image:image><image:image><image:loc>https://bohops.com/wp-content/uploads/2018/02/dir_files.png</image:loc><image:title>dir_files</image:title></image:image><image:image><image:loc>https://bohops.com/wp-content/uploads/2018/02/reg_save.png</image:loc><image:title>reg_save</image:title></image:image><image:image><image:loc>https://bohops.com/wp-content/uploads/2018/02/copy_ntds.png</image:loc><image:title>copy_ntds</image:title></image:image><image:image><image:loc>https://bohops.com/wp-content/uploads/2018/02/vshadow_create_persistent_snapshot.png</image:loc><image:title>vshadow_create_persistent_snapshot</image:title></image:image><image:image><image:loc>https://bohops.com/wp-content/uploads/2018/02/autoruns_highlighted.png</image:loc><image:title>autoruns_highlighted</image:title></image:image><image:image><image:loc>https://bohops.com/wp-content/uploads/2018/02/autoruns_windows_filter.png</image:loc><image:title>autoruns_windows_filter</image:title></image:image><image:image><image:loc>https://bohops.com/wp-content/uploads/2018/02/autoruns_microsoft_filter.png</image:loc><image:title>autoruns_microsoft_filter</image:title></image:image><lastmod>2022-12-15T12:06:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://bohops.com/2018/02/26/leveraging-inf-sct-fetch-execute-techniques-for-bypass-evasion-persistence/</loc><image:image><image:loc>https://bohops.com/wp-content/uploads/2018/02/notsct1.png</image:loc><image:title>notsct</image:title></image:image><image:image><image:loc>https://bohops.com/wp-content/uploads/2018/02/notsct.png</image:loc><image:title>notsct</image:title></image:image><image:image><image:loc>https://bohops.com/wp-content/uploads/2018/02/get_request.png</image:loc><image:title>get_request</image:title></image:image><image:image><image:loc>https://bohops.com/wp-content/uploads/2018/02/cmstp_autoruns2.png</image:loc><image:title>cmstp_autoruns2</image:title></image:image><image:image><image:loc>https://bohops.com/wp-content/uploads/2018/02/cmstp_autoruns1.png</image:loc><image:title>cmstp_autoruns1</image:title></image:image><image:image><image:loc>https://bohops.com/wp-content/uploads/2018/02/launchinfsectionmalware21.png</image:loc><image:title>LaunchInfSectionMalware2</image:title></image:image><image:image><image:loc>https://bohops.com/wp-content/uploads/2018/02/launchinfsectionmalware1.png</image:loc><image:title>LaunchInfSectionMalware</image:title></image:image><image:image><image:loc>https://bohops.com/wp-content/uploads/2018/02/launchinfsectionmalware2.png</image:loc><image:title>LaunchInfSectionMalware2</image:title></image:image><image:image><image:loc>https://bohops.com/wp-content/uploads/2018/02/launchinfsection3.png</image:loc><image:title>LaunchInfSection3</image:title></image:image><image:image><image:loc>https://bohops.com/wp-content/uploads/2018/02/launchinfsection2.png</image:loc><image:title>LaunchInfSection2</image:title></image:image><lastmod>2022-12-15T12:04:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://bohops.com/2018/03/10/leveraging-inf-sct-fetch-execute-techniques-for-bypass-evasion-persistence-part-2/</loc><image:image><image:loc>https://bohops.com/wp-content/uploads/2018/03/successfulrunkey.png</image:loc><image:title>successfulrunkey</image:title></image:image><image:image><image:loc>https://bohops.com/wp-content/uploads/2018/03/autoruns_nofilter.png</image:loc><image:title>autoruns_nofilter</image:title></image:image><image:image><image:loc>https://bohops.com/wp-content/uploads/2018/03/runkeypersist.png</image:loc><image:title>runkeypersist</image:title></image:image><image:image><image:loc>https://bohops.com/wp-content/uploads/2018/03/12_autoruns_no_filter1.png</image:loc><image:title>12_autoruns_no_filter</image:title></image:image><image:image><image:loc>https://bohops.com/wp-content/uploads/2018/03/7_found_a_blog_to_invoke1.png</image:loc><image:title>7_Found_a_blog_to_invoke</image:title></image:image><image:image><image:loc>https://bohops.com/wp-content/uploads/2018/03/2_static_inf_ieunit1.png</image:loc><image:title>2_static_inf_ieunit</image:title></image:image><image:image><image:loc>https://bohops.com/wp-content/uploads/2018/03/iexpress2.jpg</image:loc><image:title>iexpress2</image:title></image:image><image:image><image:loc>https://bohops.com/wp-content/uploads/2018/03/infdefaultinstall_strings.png</image:loc><image:title>infdefaultinstall_strings</image:title></image:image><image:image><image:loc>https://bohops.com/wp-content/uploads/2018/03/infdefaultinstall_execute.png</image:loc><image:title>infdefaultinstall_execute</image:title></image:image><image:image><image:loc>https://bohops.com/wp-content/uploads/2018/03/iexpress.png</image:loc><image:title>iexpress</image:title></image:image><lastmod>2022-12-15T12:02:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://bohops.com/2018/03/17/abusing-exported-functions-and-exposed-dcom-interfaces-for-pass-thru-command-execution-and-lateral-movement/</loc><image:image><image:loc>https://bohops.com/wp-content/uploads/2018/03/10_shdocvw.png</image:loc><image:title>10_shdocvw</image:title></image:image><image:image><image:loc>https://bohops.com/wp-content/uploads/2018/03/09_shdocvw.png</image:loc><image:title>09_shdocvw</image:title></image:image><image:image><image:loc>https://bohops.com/wp-content/uploads/2018/03/08_shdocvw1.png</image:loc><image:title>08_shdocvw</image:title></image:image><image:image><image:loc>https://bohops.com/wp-content/uploads/2018/03/07_shdocvw.png</image:loc><image:title>07_shdocvw</image:title></image:image><image:image><image:loc>https://bohops.com/wp-content/uploads/2018/03/06_shdocvw.png</image:loc><image:title>06_shdocvw</image:title></image:image><image:image><image:loc>https://bohops.com/wp-content/uploads/2018/03/05_shdocvw.png</image:loc><image:title>05_shdocvw</image:title></image:image><image:image><image:loc>https://bohops.com/wp-content/uploads/2018/03/04_shdocvw.png</image:loc><image:title>04_shdocvw</image:title></image:image><image:image><image:loc>https://bohops.com/wp-content/uploads/2018/03/03_shdocvw.png</image:loc><image:title>03_shdocvw</image:title></image:image><image:image><image:loc>https://bohops.com/wp-content/uploads/2018/03/02_shdocvw.jpg</image:loc><image:title>02_shdocvw</image:title></image:image><image:image><image:loc>https://bohops.com/wp-content/uploads/2018/03/01_shdocvw.png</image:loc><image:title>01_shdocvw</image:title></image:image><lastmod>2022-12-15T12:00:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://bohops.com/2018/03/26/diskshadow-the-return-of-vss-evasion-persistence-and-active-directory-database-extraction/</loc><image:image><image:loc>https://bohops.com/wp-content/uploads/2018/03/07_hashes.png</image:loc><image:title>07_hashes</image:title></image:image><image:image><image:loc>https://bohops.com/wp-content/uploads/2018/03/06_reg_save.png</image:loc><image:title>06_reg_save</image:title></image:image><image:image><image:loc>https://bohops.com/wp-content/uploads/2018/03/05_ad_extract.png</image:loc><image:title>05_ad_extract</image:title></image:image><image:image><image:loc>https://bohops.com/wp-content/uploads/2018/03/diskshadow_ioc_03_runkeys_autoruns_nofilter1.png</image:loc><image:title>diskshadow_ioc_03_runkeys_autoruns_nofilter</image:title></image:image><image:image><image:loc>https://bohops.com/wp-content/uploads/2018/03/diskshadow_ioc_02_task_sched_autoruns.png</image:loc><image:title>diskshadow_ioc_02_task_sched_autoruns</image:title></image:image><image:image><image:loc>https://bohops.com/wp-content/uploads/2018/03/diskshadow_ioc_03_runkeys_autoruns_nofilter.png</image:loc><image:title>diskshadow_ioc_03_runkeys_autoruns_nofilter</image:title></image:image><image:image><image:loc>https://bohops.com/wp-content/uploads/2018/03/diskshadow_ioc_03_runkeys_autoruns.png</image:loc><image:title>diskshadow_ioc_03_runkeys_autoruns</image:title></image:image><image:image><image:loc>https://bohops.com/wp-content/uploads/2018/03/diskshadow_ioc_01_child_proc.png</image:loc><image:title>diskshadow_ioc_01_child_proc</image:title></image:image><image:image><image:loc>https://bohops.com/wp-content/uploads/2018/03/04_diskshadow_persistence.png</image:loc><image:title>04_diskshadow_persistence</image:title></image:image><image:image><image:loc>https://bohops.com/wp-content/uploads/2018/03/03_diskshadow_script_mode.png</image:loc><image:title>03_diskshadow_script_mode</image:title></image:image><lastmod>2022-12-15T11:59:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://bohops.com/2018/04/28/abusing-dcom-for-yet-another-lateral-movement-technique/</loc><image:image><image:loc>https://bohops.com/wp-content/uploads/2018/04/dcom_11.png</image:loc><image:title>dcom_11</image:title></image:image><image:image><image:loc>https://bohops.com/wp-content/uploads/2018/04/dcom_10.png</image:loc><image:title>dcom_10</image:title></image:image><image:image><image:loc>https://bohops.com/wp-content/uploads/2018/04/dcom_09.png</image:loc><image:title>dcom_09</image:title></image:image><image:image><image:loc>https://bohops.com/wp-content/uploads/2018/04/dcom_08.png</image:loc><image:title>dcom_08</image:title></image:image><image:image><image:loc>https://bohops.com/wp-content/uploads/2018/04/dcom_07.png</image:loc><image:title>dcom_07</image:title></image:image><image:image><image:loc>https://bohops.com/wp-content/uploads/2018/04/dcom_06.png</image:loc><image:title>dcom_06</image:title></image:image><image:image><image:loc>https://bohops.com/wp-content/uploads/2018/04/dcom_05.png</image:loc><image:title>dcom_05</image:title></image:image><image:image><image:loc>https://bohops.com/wp-content/uploads/2018/04/dcom_041.png</image:loc><image:title>dcom_04</image:title></image:image><image:image><image:loc>https://bohops.com/wp-content/uploads/2018/04/dcom_03.png</image:loc><image:title>dcom_03</image:title></image:image><image:image><image:loc>https://bohops.com/wp-content/uploads/2018/04/dcom_02.png</image:loc><image:title>dcom_02</image:title></image:image><lastmod>2022-12-15T11:56:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://bohops.com/2018/06/28/abusing-com-registry-structure-clsid-localserver32-inprocserver32/</loc><image:image><image:loc>https://bohops.com/wp-content/uploads/2018/06/progid_rundll32.png</image:loc><image:title>progid_rundll32</image:title></image:image><image:image><image:loc>https://bohops.com/wp-content/uploads/2018/06/rundll32_sta.png</image:loc><image:title>rundll32_sta</image:title></image:image><image:image><image:loc>https://bohops.com/wp-content/uploads/2018/06/reg_import.png</image:loc><image:title>reg_import</image:title></image:image><image:image><image:loc>https://bohops.com/wp-content/uploads/2018/06/vmnet_dll.png</image:loc><image:title>vmnet_dll</image:title></image:image><image:image><image:loc>https://bohops.com/wp-content/uploads/2018/06/vmnet_dir1.png</image:loc><image:title>vmnet_dir</image:title></image:image><image:image><image:loc>https://bohops.com/wp-content/uploads/2018/06/clsid_sta.png</image:loc><image:title>clsid_sta</image:title></image:image><image:image><image:loc>https://bohops.com/wp-content/uploads/2018/06/vmware_clsid.png</image:loc><image:title>vmware_clsid</image:title></image:image><image:image><image:loc>https://bohops.com/wp-content/uploads/2018/06/vmware_dll.png</image:loc><image:title>vmware_dll</image:title></image:image><image:image><image:loc>https://bohops.com/wp-content/uploads/2018/06/vmware_acl.png</image:loc><image:title>vmware_acl</image:title></image:image><image:image><image:loc>https://bohops.com/wp-content/uploads/2018/06/inprocserver32_02.png</image:loc><image:title>inprocserver32_02</image:title></image:image><lastmod>2022-12-15T11:52:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://bohops.com/2018/08/04/capturing-netntlm-hashes-with-office-dot-xml-documents/</loc><image:image><image:loc>https://bohops.com/wp-content/uploads/2018/08/email.png</image:loc><image:title>email</image:title></image:image><image:image><image:loc>https://bohops.com/wp-content/uploads/2018/08/phish_3.png</image:loc><image:title>phish_3</image:title></image:image><image:image><image:loc>https://bohops.com/wp-content/uploads/2018/08/phish_1.png</image:loc><image:title>phish_1</image:title></image:image><image:image><image:loc>https://bohops.com/wp-content/uploads/2018/08/11_captured_nethash.png</image:loc><image:title>11_captured_nethash</image:title></image:image><image:image><image:loc>https://bohops.com/wp-content/uploads/2018/08/10_word_loading_xsl.png</image:loc><image:title>10_word_loading_xsl</image:title></image:image><image:image><image:loc>https://bohops.com/wp-content/uploads/2018/08/07_open_word.png</image:loc><image:title>07_open_word</image:title></image:image><image:image><image:loc>https://bohops.com/wp-content/uploads/2018/08/06_smb_server_setup.png</image:loc><image:title>06_smb_server_setup</image:title></image:image><image:image><image:loc>https://bohops.com/wp-content/uploads/2018/08/04_xml_with_xsl_href.png</image:loc><image:title>04_xml_with_xsl_href</image:title></image:image><image:image><image:loc>https://bohops.com/wp-content/uploads/2018/08/saved_doc.png</image:loc><image:title>saved_doc</image:title></image:image><image:image><image:loc>https://bohops.com/wp-content/uploads/2018/08/09_first_time_open_office_xml_handler.png</image:loc><image:title>09_first_time_open_office_xml_handler</image:title></image:image><lastmod>2022-12-15T11:49:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://bohops.com/2018/08/18/abusing-the-com-registry-structure-part-2-loading-techniques-for-evasion-and-persistence/</loc><image:image><image:loc>https://bohops.com/wp-content/uploads/2018/08/verclsid.png</image:loc><image:title>verclsid</image:title></image:image><image:image><image:loc>https://bohops.com/wp-content/uploads/2018/08/treataspersistence.png</image:loc><image:title>treataspersistence</image:title></image:image><image:image><image:loc>https://bohops.com/wp-content/uploads/2018/08/autoruns_rundll32.png</image:loc><image:title>autoruns_rundll32</image:title></image:image><image:image><image:loc>https://bohops.com/wp-content/uploads/2018/08/autoruns_mmc_logon.png</image:loc><image:title>autoruns_mmc_logon</image:title></image:image><image:image><image:loc>https://bohops.com/wp-content/uploads/2018/08/autoruns_mmc_no_filters.png</image:loc><image:title>autoruns_mmc_no_filters</image:title></image:image><image:image><image:loc>https://bohops.com/wp-content/uploads/2018/08/autoruns_mmc_filters.png</image:loc><image:title>autoruns_mmc_filters</image:title></image:image><image:image><image:loc>https://bohops.com/wp-content/uploads/2018/08/mmc_embedding.png</image:loc><image:title>mmc_embedding</image:title></image:image><image:image><image:loc>https://bohops.com/wp-content/uploads/2018/08/clsid_reg_treatas.png</image:loc><image:title>clsid_reg_treatas</image:title></image:image><image:image><image:loc>https://bohops.com/wp-content/uploads/2018/07/hta_clsid1.png</image:loc><image:title>hta_clsid1</image:title></image:image><image:image><image:loc>https://bohops.com/wp-content/uploads/2018/07/clsid_desktop_ini_launch.png</image:loc><image:title>clsid_desktop_ini_launch</image:title></image:image><lastmod>2022-12-15T11:46:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://bohops.com/2019/01/10/com-xsl-transformation-bypassing-microsoft-application-control-solutions-cve-2018-8492/</loc><image:image><image:loc>https://bohops.com/wp-content/uploads/2019/01/network.png</image:loc><image:title>network</image:title></image:image><image:image><image:loc>https://bohops.com/wp-content/uploads/2019/01/xmldom10_object_members.png</image:loc><image:title>xmldom10_object_members</image:title></image:image><image:image><image:loc>https://bohops.com/wp-content/uploads/2019/01/wsh_script_success_jscript.png</image:loc><image:title>wsh_script_success_jscript</image:title></image:image><image:image><image:loc>https://bohops.com/wp-content/uploads/2019/01/wmic.png</image:loc><image:title>wmic</image:title></image:image><image:image><image:loc>https://bohops.com/wp-content/uploads/2019/01/winrm.png</image:loc><image:title>winrm</image:title></image:image><image:image><image:loc>https://bohops.com/wp-content/uploads/2019/01/wdac_3077_error.png</image:loc><image:title>wdac_3077_error</image:title></image:image><image:image><image:loc>https://bohops.com/wp-content/uploads/2019/01/test_xsl_no_policy.png</image:loc><image:title>test_xsl_no_policy</image:title></image:image><image:image><image:loc>https://bohops.com/wp-content/uploads/2019/01/test_xsl_bypass_dg_failed.png</image:loc><image:title>test_xsl_bypass_dg_failed</image:title></image:image><image:image><image:loc>https://bohops.com/wp-content/uploads/2019/01/test_xsl_bypass_applocker.png</image:loc><image:title>test_xsl_bypass_applocker</image:title></image:image><image:image><image:loc>https://bohops.com/wp-content/uploads/2019/01/set_constrained_to_full_attempt.png</image:loc><image:title>set_constrained_to_full_attempt</image:title></image:image><lastmod>2022-12-15T05:05:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://bohops.com/2019/05/04/abusing-catalog-file-hygiene-to-bypass-application-whitelisting/</loc><image:image><image:loc>https://bohops.com/wp-content/uploads/2019/05/picture5.png</image:loc><image:title>Picture5</image:title></image:image><image:image><image:loc>https://bohops.com/wp-content/uploads/2019/05/picture4.png</image:loc><image:title>Picture4</image:title></image:image><image:image><image:loc>https://bohops.com/wp-content/uploads/2019/05/picture3.png</image:loc><image:title>Picture3</image:title></image:image><image:image><image:loc>https://bohops.com/wp-content/uploads/2019/05/picture2.png</image:loc><image:title>Picture2</image:title></image:image><image:image><image:loc>https://bohops.com/wp-content/uploads/2019/05/picture1.png</image:loc><image:title>Picture1</image:title></image:image><image:image><image:loc>https://bohops.com/wp-content/uploads/2019/05/signed.png</image:loc><image:title>signed</image:title></image:image><lastmod>2022-12-15T04:59:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://bohops.com/2019/08/19/dotnet-core-a-vector-for-awl-bypass-defense-evasion/</loc><image:image><image:loc>https://bohops.com/wp-content/uploads/2019/08/1200px-.net_core_logo.svg_.png</image:loc><image:title>1200px-.NET_Core_Logo.svg</image:title></image:image><image:image><image:loc>https://bohops.com/wp-content/uploads/2019/08/dotnet_modules.png</image:loc><image:title>dotnet_modules</image:title></image:image><image:image><image:loc>https://bohops.com/wp-content/uploads/2019/08/dotnet_msbuild_wdac.png</image:loc><image:title>dotnet_msbuild_wdac</image:title></image:image><image:image><image:loc>https://bohops.com/wp-content/uploads/2019/08/dotnet_msbuild_failed.png</image:loc><image:title>dotnet_msbuild_failed</image:title></image:image><image:image><image:loc>https://bohops.com/wp-content/uploads/2019/08/msbuild_exec.png</image:loc><image:title>msbuild_exec</image:title></image:image><image:image><image:loc>https://bohops.com/wp-content/uploads/2019/08/dotnet_classlib.png</image:loc><image:title>dotnet_classlib</image:title></image:image><image:image><image:loc>https://bohops.com/wp-content/uploads/2019/08/dotnet_exec.png</image:loc><image:title>dotnet_exec</image:title></image:image><image:image><image:loc>https://bohops.com/wp-content/uploads/2019/08/dotnet_run.png</image:loc><image:title>dotnet_run</image:title></image:image><lastmod>2022-12-15T04:55:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://bohops.com/2019/11/14/cve-2019-1378-exploiting-an-access-control-privilege-escalation-vulnerability-in-windows-10-update-assistant-wua/</loc><lastmod>2022-12-15T04:41:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://bohops.com/2020/02/14/exploring-microsoft-teams-rooms-mtr-console-as-a-potential-attack-vector/</loc><lastmod>2022-12-15T04:39:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://bohops.com/2020/05/12/ws-management-com-another-approach-for-winrm-lateral-movement/</loc><image:image><image:loc>https://bohops.com/wp-content/uploads/2020/05/18.png</image:loc><image:title>18</image:title></image:image><image:image><image:loc>https://bohops.com/wp-content/uploads/2020/05/17.png</image:loc><image:title>17</image:title></image:image><image:image><image:loc>https://bohops.com/wp-content/uploads/2020/05/16.png</image:loc><image:title>16</image:title></image:image><image:image><image:loc>https://bohops.com/wp-content/uploads/2020/05/15.png</image:loc><image:title>15</image:title></image:image><image:image><image:loc>https://bohops.com/wp-content/uploads/2020/05/14.png</image:loc><image:title>14</image:title></image:image><image:image><image:loc>https://bohops.com/wp-content/uploads/2020/05/13.png</image:loc><image:title>13</image:title></image:image><image:image><image:loc>https://bohops.com/wp-content/uploads/2020/05/12.png</image:loc><image:title>12</image:title></image:image><image:image><image:loc>https://bohops.com/wp-content/uploads/2020/05/11.png</image:loc><image:title>11</image:title></image:image><image:image><image:loc>https://bohops.com/wp-content/uploads/2020/05/10.png</image:loc><image:title>10</image:title></image:image><image:image><image:loc>https://bohops.com/wp-content/uploads/2020/05/09.png</image:loc><image:title>09</image:title></image:image><lastmod>2022-12-15T04:39:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://bohops.com/2020/10/15/exploring-the-wdac-microsoft-recommended-block-rules-visualuiaverifynative/</loc><lastmod>2022-12-15T04:38:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://bohops.com/2020/11/02/exploring-the-wdac-microsoft-recommended-block-rules-part-ii-wfc-fsi/</loc><lastmod>2022-12-15T04:38:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://bohops.com/2021/03/16/investigating-net-clr-usage-log-tampering-techniques-for-edr-evasion/</loc><lastmod>2022-12-15T04:37:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://bohops.com/2021/05/30/abusing-and-detecting-lolbin-usage-of-net-development-mode-features/</loc><lastmod>2022-12-15T04:37:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://bohops.com/2021/08/07/cve-2021-0090-intel-driver-support-assistant-dsa-elevation-of-privilege-eop/</loc><lastmod>2022-12-15T04:36:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://bohops.com/2021/10/08/analyzing-and-detecting-a-vmtools-persistence-technique/</loc><lastmod>2022-12-15T04:36:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://bohops.com/2022/08/22/investigating-net-clr-usage-log-tampering-techniques-for-edr-evasion-part-2/</loc><image:image><image:loc>https://bohops.com/wp-content/uploads/2022/08/image-28.png</image:loc><image:title>image-28</image:title></image:image><image:image><image:loc>https://bohops.com/wp-content/uploads/2022/08/image-27.png</image:loc><image:title>image-27</image:title></image:image><image:image><image:loc>https://bohops.com/wp-content/uploads/2022/08/image-26.png</image:loc><image:title>image-26</image:title></image:image><image:image><image:loc>https://bohops.com/wp-content/uploads/2022/08/image-25.png</image:loc><image:title>image-25</image:title></image:image><image:image><image:loc>https://bohops.com/wp-content/uploads/2022/08/image-24.png</image:loc><image:title>image-24</image:title></image:image><image:image><image:loc>https://bohops.com/wp-content/uploads/2022/08/image-23.png</image:loc><image:title>image-23</image:title></image:image><image:image><image:loc>https://bohops.com/wp-content/uploads/2022/08/image-22.png</image:loc><image:title>image-22</image:title></image:image><image:image><image:loc>https://bohops.com/wp-content/uploads/2022/08/image-21.png</image:loc><image:title>image-21</image:title></image:image><image:image><image:loc>https://bohops.com/wp-content/uploads/2022/08/image-20.png</image:loc><image:title>image-20</image:title></image:image><image:image><image:loc>https://bohops.com/wp-content/uploads/2022/08/image-19.png</image:loc><image:title>image-19</image:title></image:image><lastmod>2022-12-15T04:35:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://bohops.com/2022/04/02/unmanaged-code-execution-with-net-dynamic-pinvoke/</loc><lastmod>2022-04-07T20:06:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://bohops.com/about/</loc><lastmod>2021-10-07T02:27:10+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://bohops.com</loc><changefreq>daily</changefreq><priority>1.0</priority><lastmod>2023-11-27T13:14:45+00:00</lastmod></url></urlset>
