<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
<url>
<loc>https://open-luck.kuboid.in</loc>
<lastmod>2026-03-20T14:58:28.328Z</lastmod>
<changefreq>daily</changefreq>
<priority>1</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/search</loc>
<lastmod>2026-03-20T14:58:28.328Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/conferences</loc>
<lastmod>2026-03-20T14:58:28.328Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/stats</loc>
<lastmod>2026-03-20T14:58:28.328Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/about</loc>
<lastmod>2026-03-20T14:58:28.328Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/cracking-the-lens-exploiting-https-hidden-attack-surface-zP4b3pw94s0</loc>
<lastmod>2026-03-10T09:53:16.357Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/evading-in-plain-sight-how-adversaries-beat-user-mode-protection-engines-for-over-a-decade-ox2lq9vsC8Q</loc>
<lastmod>2026-03-11T18:14:57.221Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/black-hat-usa-2025-or-hacking-the-status-quo-tales-from-leading-women-in-cybersecurity-8V4i8TW1YXU</loc>
<lastmod>2026-03-13T05:30:54.631Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/black-hat-usa-2025-or-locknote-conclusions-and-key-takeaways-from-black-hat-usa-2025-DmXlafnjn0M</loc>
<lastmod>2026-03-13T05:32:42.676Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/ghost-calls-abusing-web-conferencing-for-covert-command-and-control-V9znA01MqUc</loc>
<lastmod>2026-03-13T05:48:48.683Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/peril-at-the-plug-investigating-ev-charger-security-and-safety-failures-4l6hsv8IlWE</loc>
<lastmod>2026-03-13T05:55:25.650Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/oopssec-the-bad-the-worst-and-the-ugly-of-apts-operations-security-StSLxFbVz0M</loc>
<lastmod>2026-03-10T10:52:42.302Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/plumbing-the-plumber-a-playbook-for-integration-servers-wgf5GKrY3nc</loc>
<lastmod>2026-03-10T10:59:31.668Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/mapping-the-shadow-war-from-estonia-to-ukraine-y-1_nKM8DRQ</loc>
<lastmod>2026-03-10T11:00:42.447Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/inside-the-shadows-tracking-raas-groups-and-evolving-cyber-threats-esKyHO5WjPU</loc>
<lastmod>2026-03-10T13:36:47.228Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/how-to-become-one-of-them-deep-cover-operations-in-cybercriminal-communities-aSOiPxOBs1E</loc>
<lastmod>2026-03-10T13:37:58.968Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/building-local-knowledge-graphs-for-osint-bypassing-rate-limits-and-maintaining-opsec-yIUfntW_TxY</loc>
<lastmod>2026-03-10T13:39:38.812Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/autonomous-video-hunter-ai-agents-for-real-time-osint-oHjQSpcP664</loc>
<lastmod>2026-03-10T13:40:39.356Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/mft2-more-fungible-threats-tAKcNZNxy5g</loc>
<lastmod>2026-03-10T16:49:45.307Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/pretty-good-pivot-examining-the-pgp-key-pair-creation-habits-of-dark-net-vendors-6mykx1zS1yo</loc>
<lastmod>2026-03-10T14:30:45.376Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/plug-and-prey-scanning-and-scoring-browser-extensions-WH6QRkoDlhk</loc>
<lastmod>2026-03-10T14:32:50.710Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/osint-signals-pop-quiz-L-ZqeZbiWn8</loc>
<lastmod>2026-03-10T14:34:30.520Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/analyzing-foreign-tech-from-online-retailers-MAtllbHmxP4</loc>
<lastmod>2026-03-10T14:38:27.907Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/from-dare-to-discovery-how-osint-and-modern-recon-techniques-uncovered-a-global-vpn-infrastructure-4HGFlZZfWc8</loc>
<lastmod>2026-03-10T14:42:23.447Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/ai-assisted-web-attack-surface-enumeration-IzsBS_E2RVY</loc>
<lastmod>2026-03-10T14:45:17.396Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/discord-osint-an-empathic-banana-and-a-data-scraper-walk-into-a-search-bar-Xp4lWpD20Mo</loc>
<lastmod>2026-03-10T14:49:35.217Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/ctiagent-automated-battlecards-from-cti-reports-Y8xMr2JwyjU</loc>
<lastmod>2026-03-10T14:52:04.573Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/attack-surface-in-motion-why-todays-threats-dont-knock-first-N7w6FklAmVA</loc>
<lastmod>2026-03-10T14:54:52.109Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/black-hat-usa-2025-or-exploiting-dns-for-stealthy-user-tracking-xQy1YcLK1Ak</loc>
<lastmod>2026-03-13T05:31:30.366Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/the-fortress-island-of-voting-system-physical-security-yvbe6n82f0I</loc>
<lastmod>2026-03-10T15:01:53.676Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/its-not-safe-yet-online-voting-in-practice-g0GXWp4QmAs</loc>
<lastmod>2026-03-10T15:04:24.649Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/is-end-to-end-verifiability-a-magic-bullet-for-internet-voting-gMvNKsl65NA</loc>
<lastmod>2026-03-10T15:05:58.227Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/carver-vulnerability-analysis-and-the-us-voting-system-rqMNllTo6wc</loc>
<lastmod>2026-03-10T15:09:27.176Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/def-con-33-fingerprint-based-bot-blocking-and-dynamic-deception-adel-karimi-G7twgn-gi9k</loc>
<lastmod>2026-03-10T17:01:52.757Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/risk-limiting-audits-f-QuFskAyOM</loc>
<lastmod>2026-03-10T15:11:40.358Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/dominion-touchscreen-simple-hacks-and-daunting-recoveries-gRU0-z1of2Y</loc>
<lastmod>2026-03-10T15:14:42.007Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/regulatory-failures-with-ballot-marking-devices-y1zZtEm_rvk</loc>
<lastmod>2026-03-10T15:17:10.739Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/when-the-paper-trail-leads-nowhere-URWjVRUDNiI</loc>
<lastmod>2026-03-10T15:19:09.949Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/protecting-election-security-researchers-globally-5qmpv44knF8</loc>
<lastmod>2026-03-10T15:21:01.714Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/a-review-of-post-election-audits-in-swing-states-5mWnGZWUEMQ</loc>
<lastmod>2026-03-10T15:23:51.672Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/evidence-based-elections-and-software-independence-8rIM5aTApKo</loc>
<lastmod>2026-03-10T15:26:10.231Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/dmca-security-research-exemption-and-election-security-XVJd08ehNs4</loc>
<lastmod>2026-03-10T15:30:58.613Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/a-ny-legal-challenge-to-the-expressvote-xls-use-of-barcodes-edxqLUizSWE</loc>
<lastmod>2026-03-10T15:33:13.769Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/when-insiders-become-the-threat-OyUNja7QSv8</loc>
<lastmod>2026-03-10T15:35:21.067Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/reflections-on-ttbr-and-everest-eRW2YjY0QuM</loc>
<lastmod>2026-03-10T15:37:09.331Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/history-and-significance-of-the-ttbr-and-peaswg-F_Xz9rMgWzE</loc>
<lastmod>2026-03-10T15:39:26.483Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/voting-village-introduction-YBcJEiP_k7k</loc>
<lastmod>2026-03-10T15:41:15.707Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/an-introduction-to-reverse-engineering-h9ewUS6FTFQ</loc>
<lastmod>2026-03-10T15:49:10.479Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/the-truth-about-cybersecurity-mU9djJSqdBQ</loc>
<lastmod>2026-03-10T15:53:22.542Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/petty-proteins-when-molecules-go-rogue-and-why-cyberbiosecurity-needs-you-ZqjADCvE5UQ</loc>
<lastmod>2026-03-10T15:57:56.331Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/the-african-cybercrime-economy-inside-the-playbooks-of-digital-hustlers-IfmVPqBUAMc</loc>
<lastmod>2026-03-10T16:00:48.216Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/following-threat-actors-rhythm-to-give-them-more-blues-F_BTn1FjbHU</loc>
<lastmod>2026-03-10T16:03:17.113Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/hooks-and-hooks-how-ai-is-revolutionizing-both-phishing-attacks-and-our-defenses-7IFsoRaYYgs</loc>
<lastmod>2026-03-10T16:05:20.587Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/embedded-system-design-how-its-different-from-traditional-software-design-S4jr6k52sNU</loc>
<lastmod>2026-03-10T16:07:49.117Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/audit-this-breaking-down-bias-in-the-cyber-stack-OEMnm1GAYlQ</loc>
<lastmod>2026-03-10T16:10:33.744Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/the-price-of-progress-exploring-cybersecuritys-role-in-managing-ai-risk-to-community-ecosystems-98LptR2jhqM</loc>
<lastmod>2026-03-10T16:13:16.031Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/bic-pick-walkthrough-BczXjBh6bsM</loc>
<lastmod>2026-03-10T16:18:52.289Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/lets-lose-the-shock-mystery-of-linux-a-pain-free-intro-R_rpuLpfMZM</loc>
<lastmod>2026-03-10T16:21:18.942Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/meshtastic-under-the-microscope-from-chirps-to-chat-SM1XSxP6W78</loc>
<lastmod>2026-03-10T16:23:08.830Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/tactical-flipper-zero-b8-uDKkfw5c</loc>
<lastmod>2026-03-10T16:25:28.198Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/so-what-the-heck-is-this-radio-stuff-anyway-v76lYD5odfA</loc>
<lastmod>2026-03-10T16:27:28.992Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/warflying-in-a-cessna-part-ii-upping-our-game-KwI2daso3ug</loc>
<lastmod>2026-03-10T16:29:26.426Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/running-a-software-defined-radio-capture-the-flag-using-challengectl-98_3eRPuuYM</loc>
<lastmod>2026-03-10T16:31:27.955Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/rayhunter-testbed-RkIz4VcsEdo</loc>
<lastmod>2026-03-10T16:33:07.427Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/mcjump-box-leveraging-free-corporate-wifi-and-80211ah-for-unattributable-fun-and-profit-RpkYQDaEKMo</loc>
<lastmod>2026-03-10T16:35:19.184Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/hung-out-to-dry-airing-the-dirty-laundry-of-stored-value-wash-cards-BNOmouHeAOw</loc>
<lastmod>2026-03-10T16:37:43.669Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/airborne-wifi-rogue-waves-in-the-sky-9iXHZHwc2MY</loc>
<lastmod>2026-03-10T16:39:18.855Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/you-might-be-a-wardriver-if-PsfM_ZDgffU</loc>
<lastmod>2026-03-10T16:41:12.012Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/the-small-packet-of-bits-that-can-save-or-destabilize-a-city-3C-_TaYht68</loc>
<lastmod>2026-03-10T16:45:23.206Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/meshtastic-command-and-control--e9V_hlWlVo</loc>
<lastmod>2026-03-10T16:47:41.176Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/tracking-300k-drives-what-weve-learned-after-13-years-4TZ3F5bv2T0</loc>
<lastmod>2026-03-10T16:51:54.086Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/llm-assisted-risk-management-for-small-teams-and-small-budgets-Gbyw-epvpCk</loc>
<lastmod>2026-03-15T06:04:04.470Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/post-quantum-panic-when-will-the-cracking-begin-and-can-we-detect-it-OkVYJx1iLNs</loc>
<lastmod>2026-03-10T16:55:26.214Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/deepfake-image-and-video-detection-GPqL9_muXJA</loc>
<lastmod>2026-03-10T16:57:19.021Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/contextualizing-and-correlating-security-events-at-scale-k2r3JrodFaI</loc>
<lastmod>2026-03-10T16:59:30.601Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/ssh-honeypots-and-walkthrough-workshops-TXUSC5YEDPo</loc>
<lastmod>2026-03-10T17:02:53.872Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/the-state-of-open-source-in-the-federal-government-S_Ly_eXY65k</loc>
<lastmod>2026-03-10T17:05:39.809Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/dark-capabilities-when-tech-companies-become-threat-actors-I5N7Ro-aTh4</loc>
<lastmod>2026-03-10T17:08:44.438Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/third-party-access-granted-a-postmortem-on-student-privacy-and-the-exploit-thats-still-in-production-06CZrbjy9qM</loc>
<lastmod>2026-03-10T17:12:25.831Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/uncovering-and-responding-to-the-tj-actions-supply-chain-breach--BCngzJC1Rc</loc>
<lastmod>2026-03-13T05:40:48.855Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/building-onramps-for-emergency-web-archiving-in-ukraine-and-beyond-4uV61EHLKKA</loc>
<lastmod>2026-03-10T17:15:50.499Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/prc-cyber-attack-motivations-medical-big-data-bp4E9ri5Xd4</loc>
<lastmod>2026-03-10T17:17:51.504Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/secure-code-is-critical-infrastructure-3V-URruNQck</loc>
<lastmod>2026-03-10T17:20:11.837Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/examining-access-control-vulnerabilities-in-graphql-mPo-an8BUXc</loc>
<lastmod>2026-03-10T17:22:20.330Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/carding-is-dead-long-live-carding-how-maas-is-fueling-nfc-relay-attacks-JSDwexw90zs</loc>
<lastmod>2026-03-10T17:24:31.221Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/genai-red-teaming-for-payment-fraud-EiXbzVlNYro</loc>
<lastmod>2026-03-10T17:26:25.860Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/scamming-the-scammers-weaponizing-open-source-against-pig-butchering-and-organized-crime-0KGhP4qjmXk</loc>
<lastmod>2026-03-10T17:28:24.166Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/contactless-card-payment-security-analysis-_fGpR4Fqni0</loc>
<lastmod>2026-03-10T17:32:17.225Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/take-all-my-money-penetrating-atms-auoEA8ZD8YA</loc>
<lastmod>2026-03-10T17:34:18.894Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/from-pwn-to-plan-turning-physical-exploits-into-upgrades-NURO3NgtXUQ</loc>
<lastmod>2026-03-10T17:36:25.567Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/intro-to-physical-security-bypass-methods-and-remediations-tTAISQqmxWQ</loc>
<lastmod>2026-03-10T17:38:22.404Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/how-not-to-do-a-physical-security-penetration-test-DNP_fHTMy84</loc>
<lastmod>2026-03-10T17:40:10.483Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/flipping-locks-remote-badge-cloning-with-the-flipper-zero-and-more-ro-EkKjj_wc</loc>
<lastmod>2026-03-10T17:42:10.147Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/hacking-hotel-locks-the-saflok-vulnerabilities-expanded-ZODLZuy6H4U</loc>
<lastmod>2026-03-10T17:47:01.624Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/intro-to-elevator-hacking-LrzGrp8L1XI</loc>
<lastmod>2026-03-10T17:48:56.763Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/your-passkey-is-weak-phishing-the-unphishable-xdl08cPDgtE</loc>
<lastmod>2026-03-10T17:50:43.579Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/access-control-done-right-the-first-time-6OFZjlym4r0</loc>
<lastmod>2026-03-10T17:52:03.039Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/the-anatomy-of-a-crypto-scam-uLpCI6CV3Uw</loc>
<lastmod>2026-03-10T17:54:12.999Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/oblivious-ram-from-theory-to-large-scale-deployment-BGuaIun8qiA</loc>
<lastmod>2026-03-10T17:56:20.278Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/evolution-of-drain-attacks-Y3IohAauLfE</loc>
<lastmod>2026-03-10T17:58:11.879Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/purple-teaming-and-adversary-emulation-wU7xaXDupZo</loc>
<lastmod>2026-03-10T18:00:03.127Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/adversarial-mindset-and-red-teaming-PZLmzbyYs2g</loc>
<lastmod>2026-03-10T18:02:20.600Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/malware-in-the-gist-how-malicious-packages-bypass-existing-security-tools-emhocCFs9N4</loc>
<lastmod>2026-03-10T18:04:01.327Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/letthemin-facilitating-high-value-purple-teams-using-an-assumed-compromise-approach-xM8nodIw1_E</loc>
<lastmod>2026-03-10T18:05:51.754Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/red-russians-how-russian-apts-are-following-red-team-research-bpUxuOdfGHM</loc>
<lastmod>2026-03-10T18:10:18.512Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/totaltest-simulations-v2oh-from-exploits-to-economics-2EYYmncELXs</loc>
<lastmod>2026-03-10T18:18:51.645Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/blurred-lines-of-cyber-threat-attribution-the-evolving-tactics-of-north-korean-cyber-threat-actors-j5gxdWd5sMg</loc>
<lastmod>2026-03-10T18:11:39.954Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/of-stochastic-parrots-and-deterministic-predators-9to68PN5rRU</loc>
<lastmod>2026-03-10T18:13:07.182Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/here-and-now-exploiting-the-human-layer-at-the-right-moment-vvDostysRAU</loc>
<lastmod>2026-03-10T18:14:48.331Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/countering-forensics-software-by-baiting-them-nUh9GVVhjD8</loc>
<lastmod>2026-03-10T18:16:03.046Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/hacker-vs-triage-inside-the-bug-bounty-battleground-D6p8-XAHOJU</loc>
<lastmod>2026-03-10T18:20:54.230Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/regex-for-hackers-mYC-rQ-HZaw</loc>
<lastmod>2026-03-10T18:23:18.560Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/voices-from-the-frontlines-bug-bounty-panel-YKHs2XJWmXU</loc>
<lastmod>2026-03-10T18:25:32.578Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/cyber-physical-exploitation-tracing-adversary-steps-through-cyber-physical-attack-lifecycle-12-iW20pBuI</loc>
<lastmod>2026-03-11T18:15:14.708Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/black-hat-usa-2025-or-hack-to-the-future-owning-ai-powered-tools-with-old-school-vulns-oaU6a8nuyT8</loc>
<lastmod>2026-03-13T05:09:27.872Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/full-disclosure-full-color-badge-making-story-of-the-bug-bounty-village-badge-PYFssJoDP1c</loc>
<lastmod>2026-03-10T18:28:45.036Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/sometimes-you-find-bugs-sometimes-bugs-find-you-Tglq1WT1wpA</loc>
<lastmod>2026-03-10T18:30:18.901Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/referral-beware-your-rewards-are-mine-tQRE9U1q2mk</loc>
<lastmod>2026-03-10T18:32:04.697Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/prompt-scan-exploit-ais-journey-through-zero-days-and-a-thousand-bugs-sOkgHfu4lXY</loc>
<lastmod>2026-03-10T18:34:31.290Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/back-to-basics-building-resilient-cyber-defenses-Y4ziT89VmAk</loc>
<lastmod>2026-03-10T18:35:51.691Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/one-modem-to-brick-them-all-exploiting-vulnerabilities-in-the-ev-charging-communication-kQVszh5ER1M</loc>
<lastmod>2026-03-10T18:38:12.520Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/hacking-a-head-unit-with-a-malicious-png-QKHJZ1K-7p0</loc>
<lastmod>2026-03-10T18:39:56.910Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/passive-and-active-attacks-on-tpms-systems-K5Kltw5kQpM</loc>
<lastmod>2026-03-10T18:41:29.454Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/modern-odometer-manipulation-FYHvL8V_m-Q</loc>
<lastmod>2026-03-10T18:43:03.391Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/how-api-flaws-led-to-admin-access-to-over-1000-usa-dealers-and-control-over-your-car-qNuS0rvqc8c</loc>
<lastmod>2026-03-10T18:44:43.851Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/context-aware-anomaly-detection-in-automotive-can-without-decoding-VchCd-o25z0</loc>
<lastmod>2026-03-10T18:46:17.514Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/smart-bus-smart-hacking-from-free-wifi-to-total-control-AOp0QtUORBc</loc>
<lastmod>2026-03-10T18:47:57.705Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/one-modem-to-brick-them-all-exploiting-vulnerabilities-in-the-ev-charging-communication-SQz4nySj4hg</loc>
<lastmod>2026-03-10T18:49:27.654Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/dissecting-the-goldbug-V_w5u9lONN0</loc>
<lastmod>2026-03-10T18:51:12.705Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/the-nsas-crypto-breaking-capabilities-and-standardization-vulnerabilities-OYGtNa0pJec</loc>
<lastmod>2026-03-10T18:53:08.367Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/exploiting-shadow-data-in-ai-models-and-embeddings-O7BI4jfEFwA</loc>
<lastmod>2026-03-10T18:55:06.804Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/valet-revolution-C8F5kvm2B5s</loc>
<lastmod>2026-03-10T18:56:51.084Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/the-powerpoint-glove-SJ-kfVUoENk</loc>
<lastmod>2026-03-10T19:06:15.634Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/reconfigurable-hsms-future-proofing-hardware-security-against-evolving-threats-9slY1DllYhw</loc>
<lastmod>2026-03-10T18:58:29.286Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/the-depths-that-marketers-will-plumb-to-arvFqkI4770</loc>
<lastmod>2026-03-10T18:59:52.680Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/preparing-for-post-quantum-cryptography-SfWOqqDZEWI</loc>
<lastmod>2026-03-10T19:02:38.092Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/all-your-keyboards-are-belong-to-us-KeNBWILSlC4</loc>
<lastmod>2026-03-10T19:04:19.822Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/ecs-cape-hijacking-iam-privileges-in-amazon-ecs-UV-hS-DTeik</loc>
<lastmod>2026-03-13T05:45:44.935Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/the-missing-link-drayteks-new-rces-complete-the-chain-CUZhORHp27U</loc>
<lastmod>2026-03-10T19:07:49.993Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/red-teaming-the-final-frontier-offensive-security-in-the-new-space-race-KjDaPwtYte4</loc>
<lastmod>2026-03-10T19:09:25.153Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/vulnerability-disclosure-in-aviation-oI3zxDWldKE</loc>
<lastmod>2026-03-10T19:10:59.865Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/burning-trashing-spacecraft-crashing-a-collection-of-vulnerabilities-that-will-end-your-space-mission-TAtG8rofxxE</loc>
<lastmod>2026-03-10T19:12:30.112Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/hacking-space-to-defend-it-generating-indicators-of-behavior-with-sparta-UL_c4K5dTuc</loc>
<lastmod>2026-03-10T19:13:58.168Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/quantum-resistant-healthcare-KpxHU5NPsPk</loc>
<lastmod>2026-03-10T19:15:34.878Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/community-power-in-an-age-of-ai-red-teaming-and-rights-VT-xl42KIpI</loc>
<lastmod>2026-03-10T19:16:54.562Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/holoconnect-ai-from-space-to-biohacking-NVr-rO4aJL4</loc>
<lastmod>2026-03-10T19:18:11.992Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/bare-metal-reverse-engineering-zfxKbsLKb3E</loc>
<lastmod>2026-03-10T19:19:44.648Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/how-we-protect-cat-memes-from-ddos-yGYR-tE0ljw</loc>
<lastmod>2026-03-10T19:37:52.818Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/rebuild-the-world-the-nix-ecosystem-CdNrvUrG_HM</loc>
<lastmod>2026-03-10T19:22:00.534Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/securing-agentic-ai-systems-and-multi-agent-workflows-5fJ6u--GkSk</loc>
<lastmod>2026-03-10T19:24:47.261Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/securing-k-12-and-higher-education-environments-AviifoOuaBE</loc>
<lastmod>2026-03-10T19:26:39.460Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/private-private-private-access-anywhere-luZgICpW0Kw</loc>
<lastmod>2026-03-10T19:28:51.703Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/edr-bypass-testing-a-systematic-approach-to-validating-endpoint-defenses-59GFy4-gIcQ</loc>
<lastmod>2026-03-11T18:15:30.246Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/badge-creation-101-from-sao-to-full-badgelife-e6dmGupBsJk</loc>
<lastmod>2026-03-10T19:30:33.370Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/game-hacking-101-XSzXaD6A73s</loc>
<lastmod>2026-03-10T19:32:19.575Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/ddos-the-next-generation-VlOUGECw6kc</loc>
<lastmod>2026-03-10T19:34:02.235Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/its-not-the-end-of-the-world-but-you-can-see-it-from-here-77AixFQKwVI</loc>
<lastmod>2026-03-10T19:36:06.402Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/tunnelpocalypse-the-coming-tunnel-spoofing-ddos-doomsday-qjyMK_OBgzQ</loc>
<lastmod>2026-03-10T19:39:17.590Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/what-game-hackers-teach-us-about-offensive-security-and-red-teaming-zfhiZnjJLT4</loc>
<lastmod>2026-03-10T19:40:58.457Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/tech-reclaimers-Yr3SzRHmIxk</loc>
<lastmod>2026-03-10T19:43:14.556Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/cybersecurity-in-latin-america-the-untold-stories-of-resilience-and-innovation-br2RPtCOzB0</loc>
<lastmod>2026-03-10T19:44:44.618Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/poison-in-the-wires-interactive-network-visualization-of-data-poisoning-attacks-VSOmZKHbbew</loc>
<lastmod>2026-03-11T18:15:47.051Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/osint-enabled-ghost-mode-counter-surveillance-for-everyday-people-9-a4OhOChss</loc>
<lastmod>2026-03-10T19:46:03.397Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/rebuild-the-world-nix-ecosystem-xecOnPOxc3w</loc>
<lastmod>2026-03-10T19:48:04.701Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/hard-hat-brigade-PK6F4LdwwOU</loc>
<lastmod>2026-03-10T19:49:54.637Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/reverse-engineering-go-based-malware-with-ai-TtPicirB6G4</loc>
<lastmod>2026-03-10T19:52:24.811Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/is-your-data-canadian-yet-and-other-existential-cloud-sovereignty-questions-R0PM_gjSg7k</loc>
<lastmod>2026-03-11T18:16:02.619Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/no-brain-no-gain-the-next-frontier-in-iotics-authentication-_ENNd1XMPyk</loc>
<lastmod>2026-03-10T19:55:30.733Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/never-enough-about-cameras-the-firmware-encryption-keys-hidden-under-the-rug-N4Cnso2Vbmw</loc>
<lastmod>2026-03-10T19:58:07.735Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/what-is-dead-may-never-die-the-immortality-of-sdk-bugs-MTZ9_IfZ7Bk</loc>
<lastmod>2026-03-10T19:59:49.115Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/firmware-reverse-engineering-and-security-analysis-TcxVExGxEtk</loc>
<lastmod>2026-03-10T20:01:22.661Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/unveiling-iot-vulnerabilities-from-backdoors-to-bureaucracy-L4cMPw2uDtc</loc>
<lastmod>2026-03-10T20:03:16.592Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/vibe-school-making-dumb-devices-smart-with-ai-CM_8gKlz2-o</loc>
<lastmod>2026-03-10T20:05:12.746Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/the-things-know-what-you-did-last-session-HqNgsnO5IoU</loc>
<lastmod>2026-03-10T20:06:48.430Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/smart-devices-dumb-resets-testing-firmware-persistence-in-commercial-iot-rLnlLLKISyY</loc>
<lastmod>2026-03-10T20:07:59.809Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/hacking-the-nautical-rules-of-the-road-turn-left-for-global-pwnage-WDPOk0GxxEo</loc>
<lastmod>2026-03-10T20:16:19.088Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/maritime-hacking-village-panel-cyber-policy-and-national-security-HJYTMhbtKVU</loc>
<lastmod>2026-03-10T20:09:37.581Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/taiwan-resilience-project-critical-infrastructure-security-CvMVJjPcusI</loc>
<lastmod>2026-03-10T20:11:11.349Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/state-of-the-pops-mapping-the-digital-waters-mVqNxvfaVGg</loc>
<lastmod>2026-03-10T20:13:11.288Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/pirates-of-the-north-sea-_fXLWaP4Zmo</loc>
<lastmod>2026-03-10T20:14:48.347Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/robin-the-archaeologist-of-the-dark-web-P4p1PyEFzww</loc>
<lastmod>2026-03-10T14:27:31.169Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/how-not-to-iot-lessons-in-iot-security-failures-TTdK1lbM5VI</loc>
<lastmod>2026-03-10T16:53:53.255Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/securing-intelligence-how-hackers-are-breaking-modern-ai-systems-e109g1uauCg</loc>
<lastmod>2026-03-10T18:27:38.637Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/boarding-the-vsat-real-world-exploits-testbed-validation-and-policy-gaps-in-maritime-connectivity-Wc9GPvu-Yso</loc>
<lastmod>2026-03-11T04:42:41.757Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/resilient-and-reconfigurable-maritime-communications-N0XFOS1kHaM</loc>
<lastmod>2026-03-11T04:44:10.521Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/nmea2000-fingerprinting-LbIAmMXCjZ0</loc>
<lastmod>2026-03-11T04:45:39.137Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/reverse-engineering-marine-engines-AYi5mEWAHzY</loc>
<lastmod>2026-03-11T04:47:14.207Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/how-computers-kill-people-maritime-systems-s1-4KoND6wM</loc>
<lastmod>2026-03-11T04:48:51.653Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/harden-the-dmz-Qf7oNWKGL2I</loc>
<lastmod>2026-03-11T05:09:06.646Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/navigating-the-invisible-predictive-threat-intelligence-in-maritime-operations-JgKUrRaKo7o</loc>
<lastmod>2026-03-11T04:50:31.047Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/hull-integrity-applying-mosaics-to-maritime-mission-systems-A6AkQrXDgQ4</loc>
<lastmod>2026-03-11T04:51:47.543Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/hijacking-marine-autopilots-tFrZ75IECjg</loc>
<lastmod>2026-03-11T04:53:04.798Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/creating-a-virtual-ship-environment-optimized-for-cybersecurity-use-WHD8NAY9BhU</loc>
<lastmod>2026-03-11T04:54:30.235Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/red-alerts-and-blue-oceans-incident-response-from-a-sysadmins-war-room-in-maritime-ops-o6-H-3Sx6i0</loc>
<lastmod>2026-03-11T04:56:27.132Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/dont-cry-wolf-evidence-based-assessment-of-ics-threats-6U_CepoMSl4</loc>
<lastmod>2026-03-11T05:00:40.385Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/ot-soc-and-incident-response-AXN3sTAr9R4</loc>
<lastmod>2026-03-11T05:04:48.525Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/deception-in-depth-for-ics-_ghyf3J92UQ</loc>
<lastmod>2026-03-11T05:06:17.867Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/there-and-back-again-detecting-ot-devices-across-protocol-gateways-YBPYYk8FIkc</loc>
<lastmod>2026-03-11T05:07:51.093Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/auto-generating-neural-asr-rules-for-ot-specific-attacks-via-nlp-MJV5FQztfi4</loc>
<lastmod>2026-03-11T05:10:25.063Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/intro-to-common-industrial-protocol-and-exploits-S7mPcEPaKHU</loc>
<lastmod>2026-03-11T05:11:50.799Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/critically-neglected-cybersecurity-for-buildings--ElW725i8z4</loc>
<lastmod>2026-03-11T05:13:45.554Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/disguisedelimit-exploiting-synology-nas-with-delimiters-and-novel-tricks-3F5icGjDWfg</loc>
<lastmod>2026-03-11T05:15:11.054Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/the-apex-adversary-deconstructing-a-meta-adversary-forged-from-offensive-ai-xC7CDrgI2VU</loc>
<lastmod>2026-03-11T18:16:18.596Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/browser-extension-clickjacking-one-click-and-your-credit-card-is-stolen-Gu4IoDXNqoU</loc>
<lastmod>2026-03-11T05:17:13.934Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/cant-stop-the-rop-automating-universal-aslr-bypasses-for-windows-NrTNNi9PP5Y</loc>
<lastmod>2026-03-11T05:20:04.489Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/breakin-em-all-overcoming-pokemon-go-anti-cheating-mechanism-2En96Cg9BFw</loc>
<lastmod>2026-03-11T05:21:49.801Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/bitlocker-leveraging-windows-recovery-to-extract-secrets-Cc6vrQSVMII</loc>
<lastmod>2026-03-11T05:23:42.291Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/gateways-to-chaos-how-we-proved-modems-are-a-ticking-time-bomb-kItqWJHN_dI</loc>
<lastmod>2026-03-11T05:25:28.227Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/from-spoofing-to-tunneling-new-red-teams-networking-techniques-for-initial-access-and-evasion-mdFRLCnACJM</loc>
<lastmod>2026-03-11T05:27:04.201Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/ghost-calls-abusing-web-conferencing-for-covert-command-and-control-YVoF_mI8MIw</loc>
<lastmod>2026-03-11T05:29:20.986Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/carding-sabotage-and-survival-a-darknet-market-veteran-story-tZwaPDqXTgs</loc>
<lastmod>2026-03-11T05:31:05.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/building-a-malware-museum-u7-OFXLLsmU</loc>
<lastmod>2026-03-11T05:33:20.698Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/what-if-we-caught-sunburst-in-cicd-rewriting-the-solarwinds-playbook-with-ai-augmented-devsecops-mvC0xy-9JeA</loc>
<lastmod>2026-03-11T18:16:34.981Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/7-vulns-in-7-days-breaking-bloatware-faster-than-its-built-zSBf2CMKlBk</loc>
<lastmod>2026-03-11T05:34:57.364Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/thinking-like-a-hacker-in-the-age-of-ai-t3bKDBtdSw8</loc>
<lastmod>2026-03-11T05:36:59.641Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/rayhunter-detecting-imsi-catchers-meC2JqNAbCA</loc>
<lastmod>2026-03-11T05:38:47.279Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/ai-cyber-challenge-aixcc-results-touJ5uLlXjQ</loc>
<lastmod>2026-03-11T05:40:31.136Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/this-is-not-a-camera-rO785smLLrU</loc>
<lastmod>2026-03-11T05:42:19.353Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/breaking-wi-fi-easy-connect-a-security-analysis-of-dpp-gMNZiDfeRPQ</loc>
<lastmod>2026-03-11T05:44:00.207Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/turning-your-active-directory-into-the-attackers-c2-_l9_lNUCjP4</loc>
<lastmod>2026-03-11T05:46:07.157Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/journey-to-the-center-of-the-pstn-cA-ZQJ8EZSs</loc>
<lastmod>2026-03-11T05:48:39.724Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/amber64-mining-hacker-history-from-over-half-a-million-commodore-64-disks-PqPMyhA4NSI</loc>
<lastmod>2026-03-11T05:50:33.600Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/win-dos-epidemic-abusing-rpc-for-win-dos-and-win-ddos-JLMsfH2MVCE</loc>
<lastmod>2026-03-11T05:55:20.205Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/revault-compromised-by-your-secure-soc-SRALfyEspms</loc>
<lastmod>2026-03-11T05:57:26.931Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/how-to-secure-unique-ecosystem-shipping-1-billion-cores-KhWtkZmOPn4</loc>
<lastmod>2026-03-11T05:59:36.504Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/llm-identifies-information-stealer-infection-vectors-and-extracts-ioc-PHtTXqlViVk</loc>
<lastmod>2026-03-11T06:01:51.714Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/can-bus-for-car-nerds-and-security-people-who-should-know-better-n4Mbc0ljhqo</loc>
<lastmod>2026-03-11T18:16:51.140Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/the-domino-effect-automated-detection-and-exploitation-of-dom-clobbering-vulnerability-at-scale-JL2PT1Dac3g</loc>
<lastmod>2026-03-11T06:04:26.776Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/playing-dirty-without-cheating-getting-banned-for-fun-and-no-profit-FXIScbxJTZw</loc>
<lastmod>2026-03-11T06:06:35.243Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/one-key-two-key-i-just-stole-your-gotenna-key-DvtFoREyB0A</loc>
<lastmod>2026-03-11T06:08:24.581Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/metal-as-a-disservice-exploiting-legacy-flaws-in-cutting-edge-clouds-EtGhHCr3VLE</loc>
<lastmod>2026-03-11T06:10:23.714Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/ghost-sim-attack-hacking-mobile-network-authentication-policies-Cvm4F7yVcik</loc>
<lastmod>2026-03-11T18:17:06.961Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/unmasking-the-privacy-risks-of-apple-intelligence-BNmJ3qBP9GE</loc>
<lastmod>2026-03-11T06:12:28.247Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/we-are-currently-clean-on-opsec-the-signalgate-saga-5VlhsT5Kbsk</loc>
<lastmod>2026-03-11T06:14:31.396Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/what-is-dead-may-never-die-the-ghost-of-internet-explorer-in-windows-mapurltozone-8cb_OF_6Ek8</loc>
<lastmod>2026-03-11T06:16:35.693Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/turning-microsofts-login-page-into-our-phishing-infrastructure-B4pVpByWOcI</loc>
<lastmod>2026-03-11T06:18:24.645Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/the-one-bitcoin-heist-74_4Q329PH8</loc>
<lastmod>2026-03-11T06:20:41.184Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/mastering-apples-endpoint-security-AgYGwZjcsLo</loc>
<lastmod>2026-03-11T06:22:27.679Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/invitation-is-all-you-need-tara-for-targeted-promptware-attack-against-gemini-powered-assistants-CUxbDRR0A8I</loc>
<lastmod>2026-03-11T06:24:27.918Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/the-unrightful-heir-my-dmsa-is-your-new-domain-admin-ftNaF20RWt4</loc>
<lastmod>2026-03-11T06:26:01.667Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/infecting-the-boot-to-own-the-kernel-bootkits-and-rootkits-development-iS0XJVyxA3M</loc>
<lastmod>2026-03-11T06:27:57.738Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/from-prompts-to-plans-security-and-safety-testing-for-agentic-ai-tTp1uypVeCQ</loc>
<lastmod>2026-03-11T18:17:22.568Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/tspu-russias-firewall-and-defending-against-the-future-of-digital-repression-zcdEX1ZgXzY</loc>
<lastmod>2026-03-11T06:29:44.291Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/safe-harbor-or-hostile-waters-unveiling-the-hidden-perils-of-the-torchscript-engine-in-pytorch-iVerhbedK_0</loc>
<lastmod>2026-03-11T06:31:19.514Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/edge-of-tomorrow-foiling-large-supply-chain-attacks-by-taking-5k-abandoned-s3-buckets-from-malware-and-benign-software-jraaS3lUP0I</loc>
<lastmod>2026-03-11T06:33:31.280Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/diamonds-are-for-hackers-ldgMBEnJxms</loc>
<lastmod>2026-03-11T06:35:38.988Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/cyber-resilience-corps-protecting-communities-together-LdiawBeYOCc</loc>
<lastmod>2026-03-11T07:29:03.355Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/de-virtualizing-the-dragon-automated-unpacking-and-deobfuscation-of-nested-vm-based-protectors-uCZRf3v3EUI</loc>
<lastmod>2026-03-11T06:37:18.007Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/hackers-survival-guide-to-def-con-ia-LpnWwc8Y</loc>
<lastmod>2026-03-11T06:38:57.640Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/sccm-the-tree-that-always-bears-bad-fruits-epyI3b8Vl0M</loc>
<lastmod>2026-03-11T06:40:45.733Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/rebadged-relabeled-and-rooted-pwnage-via-the-solar-supply-chain-aKCSoAtxEHc</loc>
<lastmod>2026-03-11T06:42:31.658Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/protecting-small-organizations-in-the-era-of-ai-bots-S5DJtN1FDYo</loc>
<lastmod>2026-03-13T05:46:20.925Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/emulating-embedded-linux-devices-at-scale-with-light-touch-firmware-rehosting-f-LTMUFQzjQ</loc>
<lastmod>2026-03-11T06:44:28.688Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/dead-made-alive-again-bypassing-intent-destination-checks-and-reintroducing-launchanywhere-privilege-escalation-e7UnYV-m23c</loc>
<lastmod>2026-03-11T06:46:25.204Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/tor-a-decade-of-lessons-djM70O0SnsY</loc>
<lastmod>2026-03-11T06:48:48.349Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/unmasking-the-snitch-puck-the-creepy-iot-surveillance-tech-in-the-school-bathroom-WCnojaEpF2I</loc>
<lastmod>2026-03-11T06:50:45.204Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/black-hat-usa-2025-or-from-prompts-to-pwns-exploiting-and-securing-ai-agents-zipgr080EQU</loc>
<lastmod>2026-03-13T05:32:06.512Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/original-sin-of-sso-macos-prt-cookie-theft-and-entra-id-persistence-via-device-forgery-T13YfM8z0lE</loc>
<lastmod>2026-03-11T06:56:52.108Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/jailbreaking-the-hivemind-finding-and-exploiting-kernel-vulnerabilities-in-the-ebpf-subsystem-TXs5F-7-2aE</loc>
<lastmod>2026-03-11T07:02:47.572Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/http11-must-die-the-desync-endgame-PUCyExOr3sE</loc>
<lastmod>2026-03-11T07:06:50.115Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/hacking-hotspots-pre-auth-rce-arbitrary-sms-and-adjacent-attacks-on-5g-and-lte-routers-Rxx07Ubmcuc</loc>
<lastmod>2026-03-11T07:14:01.348Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/black-hat-usa-2025-or-how-to-secure-unique-ecosystem-shipping-1-billion-cores-JmAXnQJZbWg</loc>
<lastmod>2026-03-13T05:10:04.532Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/ctraps-ctap-client-impersonation-and-api-confusion-on-fido2-WZChYxX5i_I</loc>
<lastmod>2026-03-11T07:17:26.296Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/client-or-server-the-hidden-sword-of-damocles-in-kafka-Sa6Onq53TsY</loc>
<lastmod>2026-03-11T07:19:42.975Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/siri-ously-leaky-exploring-overlooked-attack-surfaces-across-apples-ecosystem-MWvpOW-PRJI</loc>
<lastmod>2026-03-11T07:21:51.617Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/passkeys-pwned-turning-webauthn-against-itself-GG4gAhbhPH8</loc>
<lastmod>2026-03-11T07:24:25.863Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/firewalls-under-fire-chinas-ongoing-campaign-to-compromise-network-protection-devices-MsRo12h0mrg</loc>
<lastmod>2026-03-11T07:26:21.495Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/cash-drugs-and-guns-why-your-safes-arent-safe-N3SXVOVUD1s</loc>
<lastmod>2026-03-11T07:31:46.744Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/silent-signals-exploiting-security-and-privacy-side-channels-in-end-to-end-encrypted-messengers-BgneDTH81EY</loc>
<lastmod>2026-03-11T07:33:53.897Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/not-just-a-pipeline-leak-reconstructing-the-real-attack-behind-tj-actions--CSbWpj_IZM</loc>
<lastmod>2026-03-11T07:36:01.821Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/remote-code-execution-via-midi-messages-87Ce_D8T7oI</loc>
<lastmod>2026-03-11T07:38:04.028Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/foreign-information-manipulation-and-interference-fimi-disinformation-20-threatening-patterns-pjRwkjjhOOM</loc>
<lastmod>2026-03-11T18:17:39.805Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/kill-chain-reloaded-abusing-legacy-paths-for-stealth-persistence-6D29iw3B2nM</loc>
<lastmod>2026-03-11T07:40:17.498Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/ghosts-in-the-machine-check-B6dC_KVLn6Q</loc>
<lastmod>2026-03-11T07:42:16.949Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/escaping-the-privacy-sandbox-with-client-side-de-anonymization-attacks--oaH8XE_yMQ</loc>
<lastmod>2026-03-11T07:44:10.488Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/so-long-and-thanks-for-all-the-phish-the-rise-and-fall-of-darcula-tJ4tG7nRUyU</loc>
<lastmod>2026-03-11T07:46:51.706Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/you-snooze-you-lose-rpc-racer-winning-rpc-endpoints-against-services-vBz8TBVxwk4</loc>
<lastmod>2026-03-11T07:49:41.949Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/inside-look-at-chinese-operational-relay-network-e93V9TWnxJo</loc>
<lastmod>2026-03-11T07:51:52.413Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/man-in-the-malware-intercepting-adversarial-comms-lv-hua5b_9s</loc>
<lastmod>2026-03-11T07:54:11.622Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/kill-list-hacking-an-assassination-site-on-the-dark-web-cYZmRp90hss</loc>
<lastmod>2026-03-11T07:56:03.252Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/escaping-the-privacy-sandbox-cFFhHXPsilw</loc>
<lastmod>2026-03-11T07:58:02.377Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/weaponizing-trust-investigating-a-threat-actor-targeting-security-researchers-and-academics-iTGnoDEYlog</loc>
<lastmod>2026-03-11T08:00:07.739Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/unexpected-connections-how-a-vulnerability-in-obscure-dealer-software-could-have-unlocked-your-car-from-anywhere-U1VKazuvGrc</loc>
<lastmod>2026-03-11T08:02:08.100Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/def-con-a-history-and-future-outlook-Eo5lwnTft8U</loc>
<lastmod>2026-03-11T08:03:53.461Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/corporate-national-security-quantifying-cyber-risk-as-a-national-defense-imperative-LSUyda9KwjM</loc>
<lastmod>2026-03-11T18:17:57.317Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/voice-cloning-air-traffic-control-vulnerabilities-at-runway-crossings-JKwxsGYcZq4</loc>
<lastmod>2026-03-11T08:06:20.064Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/virtualization-based-insecurity-weaponizing-vbs-enclaves-DqC4LZTTCa0</loc>
<lastmod>2026-03-11T08:08:04.722Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/wheres-my-crypto-dude-the-ultimate-guide-to-crypto-money-laundering-1uNneo9L_jU</loc>
<lastmod>2026-03-11T08:09:53.952Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/zero-trust-total-bust-1mTg32BTZlA</loc>
<lastmod>2026-03-11T08:12:10.590Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/overlaps-overriding-laps-logic-stGRkxldg-U</loc>
<lastmod>2026-03-11T08:20:03.573Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/rusty-pearls-hacking-postgresql-on-cloud-eroPf1N-pAk</loc>
<lastmod>2026-03-11T08:14:05.339Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/how-to-fake-a-badge-like-a-pro-11-tips-to-counterfeiting-event-credentials-Wq09JxymiFQ</loc>
<lastmod>2026-03-11T08:15:56.939Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/from-shanghai-to-the-shore-the-silent-threat-in-global-shipping-ohre4ObUzoo</loc>
<lastmod>2026-03-11T08:17:21.431Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/the-making-of-the-def-con-33-badges-y8kbuGgH2eQ</loc>
<lastmod>2026-03-11T08:18:38.022Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/turning-camera-surveillance-on-its-axis-wM8kOq4VVt8</loc>
<lastmod>2026-03-11T08:21:32.503Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/silent-leaks-harvesting-secrets-from-shared-linux-environments-ig8ZMiPwrAw</loc>
<lastmod>2026-03-11T08:22:58.249Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/hakcing-obd-ii-emissions-testing-jVkgYkZV8Co</loc>
<lastmod>2026-03-11T08:24:14.022Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/the-ultimate-hack-applying-lessons-learned-from-titan-to-maritime-cyber-dmgjTGuAo38</loc>
<lastmod>2026-03-11T08:25:50.333Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/shaking-out-shells-with-sshamble-XHoH4ic8fX8</loc>
<lastmod>2026-03-11T08:27:18.987Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/paywall-optional-recursive-request-exploits-UdNhZ17t8M4</loc>
<lastmod>2026-03-11T08:29:14.997Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/mind-the-data-voids-hijacking-copilot-trust-to-spread-c2-instructions-NgjyBKfqJEs</loc>
<lastmod>2026-03-11T08:30:46.874Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/binary-facades-extracting-embedded-scripts-from-compiled-macos-malware-BvRZHRlMsoU</loc>
<lastmod>2026-03-11T08:32:13.389Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/edge-of-tomorrow-foiling-large-supply-chain-attacks-by-taking-5k-abandoned-s3-buckets-from-malware-and-benign-software-Iv6VyOaG22c</loc>
<lastmod>2026-03-11T08:34:34.416Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/zero-trust-total-bust-RNXCnJvE1Zg</loc>
<lastmod>2026-03-11T08:36:42.564Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/orion-fuzzing-workflow-automation-NbWDhk-9k_k</loc>
<lastmod>2026-03-11T08:39:34.333Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/dead-made-alive-again-bypassing-intent-destination-checks-and-reintroducing-launchanywhere-privilege-escalation-kSJBEZkJ4vM</loc>
<lastmod>2026-03-11T08:41:27.116Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/eff-panel-surveillance-privacy-and-security-QmkyPl2UZHY</loc>
<lastmod>2026-03-11T08:44:41.906Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/no-vpn-needed-cryptographic-attacks-against-the-opc-ua-protocol-dFYR2oOK8wg</loc>
<lastmod>2026-03-11T08:46:47.678Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/quickshell-sharing-is-caring-about-an-rce-attack-chain-on-quick-share-mafI9UoxL6A</loc>
<lastmod>2026-03-11T18:13:05.076Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/leading-across-the-generations-rc69Nnam6fI</loc>
<lastmod>2026-03-11T18:12:49.080Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/from-days-to-hours-accelerating-cyber-threat-response-with-ai-agents-Q1-9IABavgw</loc>
<lastmod>2026-03-11T18:13:37.613Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/agentic-ai-and-identity-the-biggest-problem-were-not-solving-ewbm0uCqaFc</loc>
<lastmod>2026-03-11T18:20:13.743Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/the-once-and-future-rules-of-cybersecurity-MP_HSMJegDk</loc>
<lastmod>2026-03-11T18:22:19.412Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/from-skip-kid-to-cyber-kingpin-preventing-the-predictable-progression-TPMXnZihZxg</loc>
<lastmod>2026-03-11T18:26:22.240Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/inside-the-ransomware-machine-nqiySna0sXk</loc>
<lastmod>2026-03-11T18:29:09.374Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/proof-of-personhood-ai-deepfakes-and-the-next-evolution-of-digital-identity-verification-bllWkSuFaU4</loc>
<lastmod>2026-03-11T18:18:13.999Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/who-gets-to-point-fingers-technical-capacity-and-international-accountability-RP6qTk0vQFY</loc>
<lastmod>2026-03-11T18:32:12.158Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/cyber-please-check-all-boxes-before-you-get-pwned-BsFCvK23PCI</loc>
<lastmod>2026-03-11T18:34:46.777Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/the-byzrp-solution-a-global-operational-shield-for-rpki-validators-3eZ0VEMgEUg</loc>
<lastmod>2026-03-11T18:51:04.975Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/dismantling-the-seos-protocol-mnhGx1i6x08</loc>
<lastmod>2026-03-11T18:52:53.853Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/drone-supply-chain-grand-siege-c9SAHP92niA</loc>
<lastmod>2026-03-11T18:54:19.419Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/using-deep-learning-attribution-methods-for-fault-injection-attacks-cjQIvLHUEws</loc>
<lastmod>2026-03-11T18:56:05.767Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/impostor-syndrome-hacking-apple-mdms-using-rogue-device-enrolments-qFxBneMlYZQ</loc>
<lastmod>2026-03-11T18:57:49.365Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/perspectives-on-trust-in-hardware-supply-chains-Nv92TuocnwA</loc>
<lastmod>2026-03-11T19:00:11.947Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/operation-blackecho-voice-phishing-using-fake-financial-and-vaccine-apps-VV0Ht_5YDUg</loc>
<lastmod>2026-03-11T19:02:49.880Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/security-analysis-of-wechats-mmtls-encryption-protocol-i98Ce4NhjhA</loc>
<lastmod>2026-03-11T19:04:30.653Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/who-cares-where-waldo-is-locating-macos-users-without-their-consent-vNVYDr-rxyQ</loc>
<lastmod>2026-03-11T19:06:11.288Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/one-bug-to-rule-them-all-stably-exploiting-a-preauth-rce-vulnerability-on-windows-server-2025-CLLCcfqsuD4</loc>
<lastmod>2026-03-11T19:07:53.740Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/listen-to-the-whispers-web-timing-attacks-that-actually-work-zOPjz-sPyQM</loc>
<lastmod>2026-03-12T08:14:49.962Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/unveiling-the-mysteries-of-qualcomms-hexagon-dsp-jtag-_0W3zeQhBB8</loc>
<lastmod>2026-03-11T19:09:37.598Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/tinker-tailor-llm-spy-investigate-and-respond-to-attacks-on-genai-chatbots-QfUdKtkBRjA</loc>
<lastmod>2026-03-11T19:11:46.150Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/in-depth-mining-of-java-deserialization-gadget-chain-via-bottom-up-gadget-search-and-dataflow-aided-payload-construction-HWMjP7uFA1s</loc>
<lastmod>2026-03-11T19:13:54.296Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/think-inside-the-box-in-the-wild-abuse-of-windows-sandbox-in-targeted-attacks-YFa_Cs_hSUM</loc>
<lastmod>2026-03-11T19:16:14.415Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/your-smartcard-is-dumb-a-brief-history-of-hacking-access-control-systems-zBP2deuPQTg</loc>
<lastmod>2026-03-12T08:33:29.624Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/cyber-threats-in-the-age-of-ai-7HVUgbuX-ZU</loc>
<lastmod>2026-03-11T19:17:58.334Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/weaponized-deception-lessons-from-indonesias-muslim-cyber-army-5OpirNF1duo</loc>
<lastmod>2026-03-11T19:22:19.119Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/network-operations-center-report-nCe5I38nUUk</loc>
<lastmod>2026-03-11T19:23:56.523Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/remote-exploitation-of-nissan-leaf-controlling-critical-body-elements-from-the-internet-Y3fF1WUQL6s</loc>
<lastmod>2026-03-11T19:26:30.586Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/sweeping-the-blockchain-unmasking-illicit-accounts-in-web3-scams-Nhrc_PbeNu8</loc>
<lastmod>2026-03-11T19:29:07.548Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/state-manipulation-unveiling-new-attack-vectors-in-bluetooth-vulnerability-discovery-through-protocol-state-machine-reconfiguration-3M9UT77VFIA</loc>
<lastmod>2026-03-11T19:32:30.392Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/inbox-invasion-exploiting-mime-ambiguities-to-evade-email-attachment-detectors-eZjP91Ly1r4</loc>
<lastmod>2026-03-11T19:34:26.428Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/not-so-secret-agents-deploying-ai-to-optimize-security-operations-YEl3ocILZNo</loc>
<lastmod>2026-03-11T18:18:30.519Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/ai-powered-image-based-c2-framework-MoDYOm2fPJ0</loc>
<lastmod>2026-03-11T19:36:09.573Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/the-problems-of-embedded-python-in-excel-zQ0Z8aAqVVc</loc>
<lastmod>2026-03-11T19:37:59.663Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/kernelsnitch-leaking-kernel-heap-pointers-by-exploiting-software-induced-side-channel-leakage-of-kernel-hash-tables-jfgpIv5cbeY</loc>
<lastmod>2026-03-11T19:40:08.493Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/breaking-secure-web-gateways-for-fun-and-profit-mBZQnJ1MWYI</loc>
<lastmod>2026-03-12T08:11:13.666Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/abusing-windows-hello-without-a-severed-hand-mFJ-NUnFBac</loc>
<lastmod>2026-03-12T08:16:50.406Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/counter-deception-defending-yourself-in-a-world-full-of-lies-gHqDEMrqTjE</loc>
<lastmod>2026-03-12T08:19:01.629Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/on-your-oceans-11-team-im-the-ai-guy-pTSEViCwAig</loc>
<lastmod>2026-03-12T08:25:44.383Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/def-con-32-amdsinkclose-universal-ring2-privilege-escalation-enrique-nissim-krzysztof-okupski-zZurduFDuPk</loc>
<lastmod>2026-03-12T08:17:52.590Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/secure-code-is-critical-infrastructure-hacking-policy-for-the-public-good-JDo_RfDKQCw</loc>
<lastmod>2026-03-11T18:18:47.809Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/wpad-attacking-the-proxy-uwsykPWa5Lc</loc>
<lastmod>2026-03-12T08:36:32.332Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/breaking-diebold-nixdorf-atm-security-lF8NEsl3-kQ</loc>
<lastmod>2026-03-12T08:38:23.461Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/what-to-expect-when-youre-exploiting-attacking-and-discovering-zero-days-in-baby-monitors-and-wi-fi-cameras-caY7ls4G460</loc>
<lastmod>2026-03-12T08:51:49.438Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/using-ai-computer-vision-in-your-osint-data-analysis-TK3A510jArc</loc>
<lastmod>2026-03-12T09:26:52.471Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/watchers-being-watched-exploiting-surveillance-systems-and-their-supply-chain-v6VMEeUcqzo</loc>
<lastmod>2026-03-12T09:12:29.119Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/security-concerns-in-the-casino-industry-k7odY9gCxaI</loc>
<lastmod>2026-03-12T09:14:07.790Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/oh-my-dc-abusing-oidc-tokens-all-the-way-to-your-cloud-asd33hSRJKU</loc>
<lastmod>2026-03-12T09:17:46.408Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/maldaptive-ldap-obfuscation-de-obfuscation-and-detection-mKRS5Iyy7Qo</loc>
<lastmod>2026-03-12T09:20:12.329Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/offensive-security-testing-safeguarding-the-final-frontier-YtMutNk8RpY</loc>
<lastmod>2026-03-12T09:35:44.104Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/xr-for-all-accessibility-and-privacy-for-disabled-users-LysMyDrOGn4</loc>
<lastmod>2026-03-12T09:38:07.420Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/wu-tang-is-for-the-children-how-state-laws-intended-to-protect-children-raise-other-risks-TuAZXkMCgXI</loc>
<lastmod>2026-03-12T09:40:18.351Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/behind-closed-doors-bypassing-rfid-readers-and-physical-access-controls-DcmOObS1Wgc</loc>
<lastmod>2026-03-11T18:19:04.526Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/winning-the-game-of-active-directory-M-2d3sM3I2o</loc>
<lastmod>2026-03-12T09:45:11.887Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/warflying-in-a-cessna-anrgU7LjN1A</loc>
<lastmod>2026-03-12T09:47:35.766Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/v2gevil-ghost-in-the-wires-Ui2etjRyrUE</loc>
<lastmod>2026-03-12T09:49:10.238Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/web2-meets-web3-hacking-decentralized-applications-QipdGm6HffM</loc>
<lastmod>2026-03-12T09:51:16.506Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/rf-attacks-on-aviations-last-line-of-defense-against-mid-air-collisions-tcas-ii-p1H6-0clP7U</loc>
<lastmod>2026-03-12T16:33:22.421Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/red-team-for-ot-Utz4o7CJmAU</loc>
<lastmod>2026-03-12T09:52:54.416Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/open-sesame-how-secure-is-your-stuff-in-electronic-lockers-GPODCSvZMyM</loc>
<lastmod>2026-03-12T09:54:43.579Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/one-for-all-and-all-for-whad-wireless-shenanigans-made-easy-4xjRgr4dbzU</loc>
<lastmod>2026-03-12T10:00:50.008Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/your-ai-assistant-has-a-big-mouth-a-new-side-channel-attack-I1RqhGGRmHY</loc>
<lastmod>2026-03-12T10:03:07.269Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/hey-bro-you-got-a-lighter-i-need-to-do-some-electroporation--ad-Y18pY54</loc>
<lastmod>2026-03-12T10:04:57.921Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/xiaomi-the-money-pwn2own-2023-exploit-chain-B0A8F_Izmj0</loc>
<lastmod>2026-03-12T10:06:45.562Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/windows-downdate-executing-downgrade-attacks-on-windows-HHmxuxQ7bE8</loc>
<lastmod>2026-03-12T10:08:30.862Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/your-cicd-pipeline-is-vulnerable-but-its-not-your-fault-3dHZ-l3XSsE</loc>
<lastmod>2026-03-12T10:10:08.108Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/black-hat-eu-speaker-orientation-_i1Q0_XrbXw</loc>
<lastmod>2026-03-11T18:33:10.542Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/when-chatbots-go-rogue-lessons-learned-from-building-and-defending-llm-applications-2-C7xSJ9rhI</loc>
<lastmod>2026-03-12T10:12:22.451Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/using-epss-for-better-vulnerability-management-02ElRMhArcQ</loc>
<lastmod>2026-03-12T16:28:53.770Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/a-discussion-of-a-past-present-and-possible-future-of-bioweapons-slpJQmm3L8k</loc>
<lastmod>2026-03-12T16:30:24.845Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/dals-and-sals-the-interplay-between-safety-and-security-in-aviation-system-development-nGDTVPnTDOw</loc>
<lastmod>2026-03-12T16:31:56.962Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/open-source-intelligence-a-quickstart-guide-ksbFhXdF2EI</loc>
<lastmod>2026-03-12T16:34:54.958Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/speed-bumps-and-speed-hacks-adventures-in-car-manufacturers-security-p8NMZoPM8Yc</loc>
<lastmod>2026-03-12T16:37:36.166Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/the-curious-case-of-alice-and-bob-digital-investigation-sp91zygVcmE</loc>
<lastmod>2026-03-12T16:39:51.227Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/how-to-make-badges-p4zQ9oOQl9w</loc>
<lastmod>2026-03-12T16:42:33.181Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/quickshell-rce-attack-chain-on-quick-share-wT9gyOeN6zY</loc>
<lastmod>2026-03-12T16:44:40.069Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/psychic-paper-faking-identification-badges-with-e-ink-ssLu8xHMwSk</loc>
<lastmod>2026-03-12T16:46:44.331Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/a-recipe-for-scaling-security-vEzLsRXjatw</loc>
<lastmod>2026-03-12T16:48:47.390Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/iot-security-and-ai-threat-landscape-panel-dGSPysbdvJo</loc>
<lastmod>2026-03-12T16:50:42.307Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/solving-the-lover-stalker-killer-murder-with-strings-grep-and-perl-_1GvHMlzXOY</loc>
<lastmod>2026-03-12T16:54:36.250Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/social-engineering-ai-and-subverting-hi-kc25CttuDmw</loc>
<lastmod>2026-03-12T16:56:41.091Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/submission-smackdown-unraveling-the-threads-of-the-united-states-postal-service-sms-phishing-gLOv67LlIQs</loc>
<lastmod>2026-03-12T16:58:32.264Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/tiptoe-location-based-evasion-attack-on-object-detectors-hB6rtwoyyrg</loc>
<lastmod>2026-03-12T17:00:12.866Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/reverse-engineering-and-hacking-ecovacs-robots-_wUsM0Mlenc</loc>
<lastmod>2026-03-12T17:01:45.385Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/reflections-on-a-decade-in-bug-bounties-experiences-and-major-takeaways-h86p7pcZmL8</loc>
<lastmod>2026-03-12T17:04:30.300Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/how-i-retrofitted-a-digital-gauge-cluster-into-my-cadillac-ats-v-hnUG3hB0qVI</loc>
<lastmod>2026-03-12T17:06:10.450Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/practical-exploitation-of-dos-in-bug-bounty-b7WlUofPJpU</loc>
<lastmod>2026-03-12T17:08:04.554Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/the-not-so-silent-type-breaking-network-crypto-in-popular-chinese-keyboard-apps-RgCI3GOXLr0</loc>
<lastmod>2026-03-12T17:09:58.926Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/taming-the-beast-inside-the-red-teaming-llama-process-UQaNjwLhAmo</loc>
<lastmod>2026-03-12T17:13:00.577Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/stranger-in-a-changed-land-UCHguFqzAOQ</loc>
<lastmod>2026-03-12T17:17:03.232Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/sql-injection-lower-decks-smuggling-queries-at-the-protocol-level-Tfg1B8u1yvE</loc>
<lastmod>2026-03-12T17:20:06.241Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/black-hat-usa-2025-or-breaking-control-flow-integrity-by-abusing-modern-c-hxIPoi4ONNA</loc>
<lastmod>2026-03-13T05:10:41.196Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/reverse-engineering-micropython-frozen-modules-QXa29AJqdRc</loc>
<lastmod>2026-03-12T17:21:58.813Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/def-con-32-porn-and-privacy-et-RyuDq0cjap0</loc>
<lastmod>2026-03-12T17:23:19.525Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/open-source-hacker-vs-government-lawyer-TqLRpUmpBWY</loc>
<lastmod>2026-03-12T17:24:27.434Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/sdlc-nightmares-defeating-secure-code-review-gpt-hallucination-WsRSzJsrWAw</loc>
<lastmod>2026-03-12T17:26:25.072Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/optical-espionage-R5nMqju6crY</loc>
<lastmod>2026-03-12T17:28:16.420Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/hacking-the-car-automotive-security-vulnerabilities-and-responsible-disclosure-MDndWJxfP-U</loc>
<lastmod>2026-03-12T17:30:42.396Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/taking-off-the-blindfold-detecting-persistent-threats-on-draytek-edge-devices-BiBMsw0N_mQ</loc>
<lastmod>2026-03-12T17:33:29.389Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/ssh-based-attack-surface-analysis-G7GwXu684JY</loc>
<lastmod>2026-03-12T17:35:16.308Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/splitting-the-email-atom-exploiting-parsers-to-bypass-access-controls-JERBqoTllaE</loc>
<lastmod>2026-03-12T17:38:06.415Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/bitunlocker-leveraging-windows-recovery-to-extract-bitlocker-secrets-2CJl6mTtgws</loc>
<lastmod>2026-03-13T05:46:57.974Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/sneaky-extensions-the-mv3-escape-artists-AS_bSDxTU4w</loc>
<lastmod>2026-03-12T17:39:45.875Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/sboms-the-hard-way-hacking-bob-the-minion-Cxrwpij2MSQ</loc>
<lastmod>2026-03-12T17:41:36.043Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/redefining-v2g-how-to-use-your-vehicle-as-a-game-controller-Dh220NQIkaQ</loc>
<lastmod>2026-03-12T17:43:12.290Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/pick-your-poison-navigating-a-secure-clean-energy-transition-PZfM1ehcfmU</loc>
<lastmod>2026-03-12T17:44:53.806Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/analyzing-the-security-of-satellite-based-air-traffic-control-vJWzTt2ANAQ</loc>
<lastmod>2026-03-12T18:16:18.751Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/spies-and-bytes-victory-in-the-digital-age-Fd6v9NXmszM</loc>
<lastmod>2026-03-12T17:46:59.468Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/safe-cracking-for-everyone-6qTLxglm2fs</loc>
<lastmod>2026-03-12T17:48:33.511Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/sudos-and-sudonts--iNezAL_EF0</loc>
<lastmod>2026-03-12T17:50:26.982Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/small-satellite-modeling-and-defender-software-42OjQtrJQ5s</loc>
<lastmod>2026-03-12T17:52:58.124Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/signature-based-detection-using-network-timing-6lJ26UG9hLU</loc>
<lastmod>2026-03-12T17:54:52.233Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/shim-me-what-you-got-manipulating-shim-and-office-for-code-injection--Z34ya4rb8A</loc>
<lastmod>2026-03-12T17:56:43.386Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/an-introduction-to-rfid-hacking-0Zn5nj0NZVo</loc>
<lastmod>2026-03-12T17:58:31.935Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/the-immortal-retrofuturism-of-mainframe-computers-1upEyCKVpkI</loc>
<lastmod>2026-03-12T17:59:54.815Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/kernel-enforced-dns-exfiltration-security-Yh9C1Xn_ixo</loc>
<lastmod>2026-03-13T05:47:35.565Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/the-dark-side-of-bug-bounty-6SNy0u6pYOc</loc>
<lastmod>2026-03-12T18:02:33.601Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/relative-path-file-injection-the-next-evolution-in-rpo-3y_6oSZwLr0</loc>
<lastmod>2026-03-12T18:04:25.083Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/techniques-for-creating-process-injection-attacks-with-advanced-return-oriented-programming-1Hx-PzyGtX0</loc>
<lastmod>2026-03-12T18:05:48.725Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/secrets-and-shadows-leveraging-big-data-for-vulnerability-discovery-at-scale--KXgcWuv-Ug</loc>
<lastmod>2026-03-12T18:07:51.650Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/the-risk-and-reward-of-distributed-industrial-control-13o-MQtANpo</loc>
<lastmod>2026-03-12T19:43:03.647Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/physical-vulnerability-assessments-for-internal-employees-qY0Yb8_R3a0</loc>
<lastmod>2026-03-12T18:09:41.177Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/popping-shells-with-dollar10-and-a-bit-of-arduino-magic-zqGB07UaI6A</loc>
<lastmod>2026-03-12T18:11:18.391Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/beyond-sunset-exposing-the-occultations-lurking-in-large-scale-off-grid-solar-systems-wCt-93lEIME</loc>
<lastmod>2026-03-12T18:12:40.780Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/automobiles-alcohol-blood-sweat-and-creative-reversing-of-an-obfuscated-car-modding-tool-uKvkBchZkA0</loc>
<lastmod>2026-03-12T18:14:23.184Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/bricked-and-abandoned-keeping-the-iot-from-becoming-an-internet-of-trash-tA7bpp8qXxI</loc>
<lastmod>2026-03-12T18:18:24.194Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/a-shallow-dive-into-aircraft-pki-sjd5LrzHus0</loc>
<lastmod>2026-03-12T18:19:58.900Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/udsoncan-attacks-discovering-safety-critical-risks-by-fuzzing-zkoTwQRXMz0</loc>
<lastmod>2026-03-12T18:21:38.591Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/threat-modeling-in-the-age-of-ai-tYOJeChUM4M</loc>
<lastmod>2026-03-12T18:26:03.974Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/breaching-aws-accounts-through-shadow-resources-m9QVfYVJ7R8</loc>
<lastmod>2026-03-12T18:27:45.666Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/unmasking-cve-2023-52709-the-ti-ble5-stack-attack-mrb_3z5OP2M</loc>
<lastmod>2026-03-12T18:29:28.904Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/smm-security-and-exploitation-on-amd-processors-kEIJFsOgEBY</loc>
<lastmod>2026-03-12T18:31:21.334Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/a-treasure-trove-of-failures-what-historys-greatest-heist-can-teach-us-about-defense-in-depth-pri4EJ0634c</loc>
<lastmod>2026-03-12T18:33:23.432Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/understanding-authentication-bypass-vulnerabilities-gg5zsWyZJ90</loc>
<lastmod>2026-03-12T18:35:16.400Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/unlocking-the-gates-hacking-a-secure-industrial-remote-access-solution-fc6c2hP86Wk</loc>
<lastmod>2026-03-12T18:36:32.398Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/analysis-of-diablo-world-record-speedrun-jALLbBisg_8</loc>
<lastmod>2026-03-12T18:38:13.139Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/the-xz-backdoor-story-the-undercover-operation-that-set-the-internet-on-fire-hwuIb-Vv2Ew</loc>
<lastmod>2026-03-12T18:40:00.802Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/the-wild-and-wonderful-world-of-8-bit-microprocessors-ldsK81hGs_Q</loc>
<lastmod>2026-03-12T18:42:21.248Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/the-pwnie-awards-2024-jEexnbk9kaI</loc>
<lastmod>2026-03-12T18:44:34.796Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/securing-the-digital-ecosystem-for-the-clean-energy-transition-UmBNgn_9-zY</loc>
<lastmod>2026-03-12T18:46:11.788Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/behind-the-badge-how-we-used-and-abused-hardware-to-create-the-dc32-av-badge-dDFtkjYx0V8</loc>
<lastmod>2026-03-12T18:47:34.743Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/the-art-of-cyber-warfare-ransomware-diaries-dLOUzF6_Y54</loc>
<lastmod>2026-03-12T18:49:11.300Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/anyone-can-hack-iot-a-beginners-guide-to-hacking-your-first-iot-device-YPcOwKtRuDQ</loc>
<lastmod>2026-03-12T18:51:11.862Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/hacking-apples-usb-c-port-controller-cFW0sYSo7ZM</loc>
<lastmod>2026-03-12T18:53:18.476Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/access-control-done-right-the-first-time-WscuQr5X1kc</loc>
<lastmod>2026-03-12T18:54:57.553Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/def-con-32-exposing-attacks-hiding-in-the-sheer-noise-of-false-positives-e-tahoun-l-hamida-h8E6w3vVzWo</loc>
<lastmod>2026-03-12T20:09:49.659Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/3du-homo-ex-machina-YvqWlZK_fks</loc>
<lastmod>2026-03-12T18:57:10.729Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/the-rise-and-fall-of-binary-exploitation-cHsRxkfxvq8</loc>
<lastmod>2026-03-12T18:58:48.115Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/ticking-sqli-bVKtcu82a8w</loc>
<lastmod>2026-03-12T19:01:28.037Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/transforming-appsec-protecting-everything-as-code-and-emerging-tech-WG_oXtUTEoI</loc>
<lastmod>2026-03-12T19:03:30.437Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/behind-enemy-lines-engaging-and-disrupting-ransomware-web-panels-T5K4ABfzkhI</loc>
<lastmod>2026-03-12T19:05:53.714Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/attacks-on-gen-ai-data-and-using-vector-encryption-to-stop-them-Lxg9YyFJ8s0</loc>
<lastmod>2026-03-12T19:07:55.681Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/attack-and-defence-in-ot-O48DBFT02eU</loc>
<lastmod>2026-03-12T19:10:09.443Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/fun-with-trains-hacking-railway-signaling-systems-RHhyrcgm7n4</loc>
<lastmod>2026-03-12T19:12:16.646Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/def-con-32-jake-braun-def-con-franklin-project-0TdY9JUaybc</loc>
<lastmod>2026-03-12T23:01:54.125Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/a-shadow-librarian-in-broad-daylight-IJT6_OcY_dc</loc>
<lastmod>2026-03-12T19:13:47.393Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/0000-day-exploiting-private-networks-through-the-browser-GAEOBhsqJI4</loc>
<lastmod>2026-03-12T19:16:31.202Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/war-stories-from-a-tryhard-bug-bounty-hunter-TqKb7h8VFcA</loc>
<lastmod>2026-03-12T19:18:24.519Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/the-secret-life-of-a-rogue-device-QgeEHdAmJDg</loc>
<lastmod>2026-03-12T19:20:27.567Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/secrets-in-public-cloud-resources-7k3zOylPKbM</loc>
<lastmod>2026-03-12T19:26:18.899Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/breaking-the-beam-exploiting-vsat-satellite-modems-from-the-earths-surface--pxmly8xeas</loc>
<lastmod>2026-03-12T19:28:11.877Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/ai-cyber-challenge-semifinal-results-FDVcF28PPnI</loc>
<lastmod>2026-03-12T19:30:08.968Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/unsaflock-unlocking-millions-of-hotel-locks-4cx0RUV7i0s</loc>
<lastmod>2026-03-12T19:31:48.226Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/bridging-space-and-medicine-biohacking-village-8BC0oHu5QGQ</loc>
<lastmod>2026-03-12T19:33:23.615Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/attacking-mysql-clients-with-honeypots-8oAxv7UBZJA</loc>
<lastmod>2026-03-12T19:35:04.879Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/bolabuster-harnessing-llms-for-automating-bola-detection-9bNv3XkhjQA</loc>
<lastmod>2026-03-12T19:36:38.080Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/tough-adversary-dont-blame-sun-tzu-A-J3jGofYN8</loc>
<lastmod>2026-03-12T19:39:08.472Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/the-way-to-android-root-exploiting-your-gpu-on-smartphone-BN07rjaNqXk</loc>
<lastmod>2026-03-12T19:41:17.208Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/color-blasted-badge-making-q1Uap5uinIo</loc>
<lastmod>2026-03-12T19:45:20.377Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/famous-and-not-so-famous-unsolved-codes-tJyH6FDFy_E</loc>
<lastmod>2026-03-12T19:47:20.713Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/nano-enigma-uncovering-the-secrets-within-efuse-memories-z33TSv9EXBQ</loc>
<lastmod>2026-03-12T19:49:16.360Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/dragon-slaying-guide-bug-hunting-in-vmware-device-virtualization-sfma7ymwmdA</loc>
<lastmod>2026-03-12T19:51:03.042Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/data-on-demand-the-challenges-of-building-a-privacy-focused-ai-device-jS3iNUfYtLA</loc>
<lastmod>2026-03-12T20:11:46.860Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/inside-the-fbis-secret-encrypted-phone-company-anom-uFyk5UOyNqI</loc>
<lastmod>2026-03-12T19:53:21.930Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/adversarial-approach-to-airline-revenue-management-and-electronic-flight-bags-piW-nUKIqkE</loc>
<lastmod>2026-03-12T19:55:10.190Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/def-con-101-a-guide-to-the-conference-zGgPm2LeM8A</loc>
<lastmod>2026-03-12T19:57:17.769Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/encrypted-newspaper-ads-from-the-19th-century-krIOAKQhsGY</loc>
<lastmod>2026-03-12T19:59:32.798Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/black-hat-usa-2025-or-clue-driven-reverse-engineering-by-llm-in-real-world-malware-analysis-Ofo2RRaqVwU</loc>
<lastmod>2026-03-13T05:08:50.780Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/clash-burn-and-exploit-manipulate-filters-to-pwn-kernelctf-_1DTkkaNqfM</loc>
<lastmod>2026-03-12T20:01:38.293Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/the-history-of-hacking-a-panel-discussion-bRj4ipIEmg0</loc>
<lastmod>2026-03-12T20:04:28.136Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/compromising-an-electronic-logging-device-and-creating-a-truck2truck-worm-dnAkvpl48zY</loc>
<lastmod>2026-03-12T20:05:55.082Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/flying-blind-navigating-the-turbulent-skies-of-aviation-cybersecurity-bLgQNSQANx0</loc>
<lastmod>2026-03-12T20:07:36.804Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/driverjack-turning-ntfs-and-emulated-read-only-filesystems-into-an-infection-and-persistence-vector-kWSP4F5dxTw</loc>
<lastmod>2026-03-12T20:13:56.607Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/darpa-cyber-initiatives-and-research-edM1SvSz6pc</loc>
<lastmod>2026-03-12T20:17:15.573Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/d0-n0-h4rm-stem-storytime-fs0QR7fPnJg</loc>
<lastmod>2026-03-12T20:19:49.009Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/def-con-32-hacker-vs-ai-perspectives-from-an-ex-spy-harriet-farlow-WC-tY-gEIPc</loc>
<lastmod>2026-03-12T20:21:58.842Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/open-source-hardware-badge-design-Z6Wq1iqTyWg</loc>
<lastmod>2026-03-12T20:40:22.629Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/cybersecurity-policy-and-national-security-TUbpJ-voI8Y</loc>
<lastmod>2026-03-12T20:23:18.664Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/fireside-chat-with-rob-joyce-WGXNimCkDOE</loc>
<lastmod>2026-03-12T20:25:31.494Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/defeating-edr-evading-malware-with-memory-forensics-PmqvBe1LSZc</loc>
<lastmod>2026-03-12T20:32:15.555Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/residential-proxies-and-the-fine-line-between-use-and-abuse-a3IsOgEEauE</loc>
<lastmod>2026-03-14T19:40:09.341Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/formidable-adversaries-and-threat-actor-panel-Q-rGVE9xCKw</loc>
<lastmod>2026-03-12T20:27:28.642Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/def-con-32-diy-pharmaceuticals-michael-laufer-VTkAx3Ub6-I</loc>
<lastmod>2026-03-12T20:30:58.830Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/digital-emblems-a-new-standard-for-asset-authentication-NyOhQ4ONAUA</loc>
<lastmod>2026-03-12T20:34:24.564Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/how-we-built-our-badge-and-reverse-engineering-vending-machines-OkVNbL7gysI</loc>
<lastmod>2026-03-12T20:36:31.667Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/ive-got-99-problems-but-prompt-injection-aint-TjdATgKxqiU</loc>
<lastmod>2026-03-12T20:38:26.742Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/bypass-102-introduction-to-basic-bypass-remediation-GJgTkxL5txw</loc>
<lastmod>2026-03-12T20:41:48.679Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/from-easy-wins-to-epic-challenges-bounty-hunter-edition-MrNmdtkH3YY</loc>
<lastmod>2026-03-12T20:43:34.958Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/exploiting-bluetooth-from-your-car-to-the-bank-account-JL7a_oLoXHY</loc>
<lastmod>2026-03-12T20:46:09.147Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/exploiting-the-unexploitable-insights-from-the-kibana-bug-bounty-H-bhmSwnRdY</loc>
<lastmod>2026-03-12T20:48:03.559Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/use-and-abuse-of-personal-information-politics-edition-Lf2k8QPEPqs</loc>
<lastmod>2026-03-13T05:48:11.700Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/defeating-magic-by-magic-using-alpc-security-features-to-compromise-rpc-services-Eyl_0YxfnpQ</loc>
<lastmod>2026-03-12T20:50:12.996Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/outlook-unleashing-rce-chaos-and-patch-analysis-GwwxeY11xMI</loc>
<lastmod>2026-03-12T20:52:22.166Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/def-con-academy-a-new-paradigm-for-cybersecurity-education-KnCp5K51IEA</loc>
<lastmod>2026-03-12T20:54:30.445Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/mobile-mesh-rf-network-exploitation-getting-the-tea-from-gotenna-KqKj_VY-AHY</loc>
<lastmod>2026-03-12T20:56:45.728Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/what-happens-when-your-digital-voice-clone-goes-rogue-49odcoAoqYw</loc>
<lastmod>2026-03-11T18:12:14.379Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/regenerating-passwords-from-roboforms-password-generator-N2eKCAzM2kw</loc>
<lastmod>2026-03-12T20:58:37.380Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/fireside-chat-with-the-director-of-the-office-of-the-national-cyber-director-IUEjbuiAX18</loc>
<lastmod>2026-03-12T21:00:56.869Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/chronicles-of-a-cryptographic-heist-EvbNQnZlPJg</loc>
<lastmod>2026-03-12T21:03:22.762Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/hunters-and-gatherers-navigating-the-landscape-of-bug-bounties-9IN1Aj56hYA</loc>
<lastmod>2026-03-12T21:05:19.265Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/one-agent-to-rule-them-all-how-one-malicious-agent-hijacks-a2a-system-X_Qb_EVDQx4</loc>
<lastmod>2026-03-11T18:12:33.529Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/eradicating-hepatitis-c-with-bioterrorism-DwYkeFatP40</loc>
<lastmod>2026-03-12T21:07:37.752Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/def-con-32-iconv-set-the-charset-to-rce-exploiting-glibc-to-hack-the-php-engine-charles-fox-11Yv2Ru7gF8</loc>
<lastmod>2026-03-12T21:09:50.622Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/leveraging-private-apns-for-iot-security-research-4lQ2GnmTFkY</loc>
<lastmod>2026-03-12T21:11:11.378Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/human-dignity-in-ai-and-tech-policy-BIjgd2mOEks</loc>
<lastmod>2026-03-12T21:13:31.611Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/drivethru-hacking-now-with-delivery-SiN8iC7TTaY</loc>
<lastmod>2026-03-11T18:13:20.715Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/hookchain-edrxdr-bypass-via-user-land-ntdll-hooking-0L6TlFYwy2U</loc>
<lastmod>2026-03-12T21:15:18.156Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/leveraging-ai-for-smarter-bug-bounties-8IzKwczq0jI</loc>
<lastmod>2026-03-12T21:17:33.920Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/gotta-cache-em-all-bending-the-rules-of-web-cache-exploitation-70yyOMFylUA</loc>
<lastmod>2026-03-12T21:22:09.153Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/tinker-tailor-llm-spy-investigate-and-respond-to-attacks-on-genai-chatbots-Iah5epX_3AY</loc>
<lastmod>2026-03-11T18:13:53.811Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/mutual-authentication-is-optional-exploiting-hid-iclass-credentials-zH6qbJuqhOM</loc>
<lastmod>2026-03-12T21:24:09.853Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/introduction-to-industrial-control-systems-security-s_w7fxESt-o</loc>
<lastmod>2026-03-12T21:26:04.961Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/aviation-gnss-its-about-time-too-wSVdfOn737o</loc>
<lastmod>2026-03-12T21:27:25.229Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/malicious-fungible-tokens-uCcyd3lTPXk</loc>
<lastmod>2026-03-12T21:28:56.045Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/black-hat-usa-2025-or-training-specialist-models-automating-malware-development-WKmEzRJZ6H4</loc>
<lastmod>2026-03-13T05:18:46.632Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/initial-access-dojo-xcbKIWXThT4</loc>
<lastmod>2026-03-12T21:30:58.561Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/the-evolution-of-cryptography-w4M_Z0D1rdY</loc>
<lastmod>2026-03-12T21:32:56.037Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/physical-fitness-for-physical-red-teaming-ocXSZRKmI0I</loc>
<lastmod>2026-03-12T21:35:07.372Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/ive-got-99-problems-but-prompt-injection-aint-oql3ec-Ia4I</loc>
<lastmod>2026-03-12T21:37:14.806Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/exploiting-aws-service-vulnerabilities-for-initial-access-oAriLYN-5HA</loc>
<lastmod>2026-03-12T21:39:04.185Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/sboms-the-missing-link-trjjcTscg-o</loc>
<lastmod>2026-03-12T21:40:33.846Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/i-am-still-the-captain-now-j7twZA6SBz8</loc>
<lastmod>2026-03-12T21:43:03.434Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/evading-modern-defenses-when-phishing-with-pixels-l89qpmb2CAQ</loc>
<lastmod>2026-03-12T21:44:14.079Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/locksport-competitions-go-for-the-gold-in-the-olympics-of-locks-j3A5zQAAwcc</loc>
<lastmod>2026-03-12T21:45:34.146Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/manufacturing-lessons-learned-lessons-given-fqFKbDib8CY</loc>
<lastmod>2026-03-12T21:47:18.171Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/internet-protocol-v-6-kGvU_MuxZ2c</loc>
<lastmod>2026-03-12T21:49:04.252Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/mowireless-moproblems-modular-wireless-survey-systems-and-the-data-analytics-that-love-them-jrlvMXfftec</loc>
<lastmod>2026-03-12T21:51:03.940Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/dysfunctional-unity-the-road-to-nowhere-iUnPLLvA4Gc</loc>
<lastmod>2026-03-12T21:52:35.382Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/exploiting-voice-cloning-in-adversarial-simulation-glTCi9SaJbM</loc>
<lastmod>2026-03-12T21:54:03.424Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/measuring-the-tor-network-n8w85LpRplY</loc>
<lastmod>2026-03-12T21:56:00.436Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/navigating-the-cyber-security-labyrinth-choose-your-own-security-adventure-iN1c0j4nGvo</loc>
<lastmod>2026-03-12T21:57:37.657Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/laundering-money-dldX9UFhNTs</loc>
<lastmod>2026-03-12T21:59:05.118Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/microhard-more-like-microeasy-SPGt3M4rXJU</loc>
<lastmod>2026-03-12T22:00:41.994Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/the-fault-in-our-parsers-incubated-ml-exploits-Z38pTFM0FyU</loc>
<lastmod>2026-03-12T22:02:04.651Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/xr-applications-in-the-national-lab-mission-space-Qua92jLf2fE</loc>
<lastmod>2026-03-12T22:04:10.848Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/decoding-galah-an-llm-powered-web-honeypot-XGsm4Qcc_Ag</loc>
<lastmod>2026-03-12T22:06:11.128Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/ground-control-to-major-threat-hacking-the-space-link-extension-protocol-QvywfDmdasc</loc>
<lastmod>2026-03-12T22:08:04.900Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/kubernetes-attack-simulation-the-definitive-guide-PFeqxSD7Gh8</loc>
<lastmod>2026-03-12T22:09:55.550Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/breaking-learning-codes-es72oviu0Lg</loc>
<lastmod>2026-03-12T22:11:36.774Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/maturing-your-appsec-program-Tv_W0iRr0qQ</loc>
<lastmod>2026-03-12T22:13:10.415Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/unmasking-a-north-korean-it-farm-exposing-the-tradecraft-behind-their-global-disguise-wUQJ5pjZDgo</loc>
<lastmod>2026-03-11T18:14:09.391Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/gridlock-the-dual-edged-sword-of-ev-and-solar-apis-in-grid-security-PwcIyS9bc_o</loc>
<lastmod>2026-03-12T22:15:02.436Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/doors-cameras-and-mantraps-oh-my-J7GFF-GVOpA</loc>
<lastmod>2026-03-12T22:16:50.265Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/exploiting-bluetooth-from-your-car-to-the-bank-account-MS582wba46E</loc>
<lastmod>2026-03-12T22:18:14.007Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/protecting-the-skies-detecting-ads-b-spoofing-with-fly-catcher-KytDyg5s-E8</loc>
<lastmod>2026-03-12T22:19:36.867Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/the-unrightful-heir-my-dmsa-is-your-new-domain-admin-US2EjLnCcsI</loc>
<lastmod>2026-03-11T18:14:25.337Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/demonstrating-the-simplicity-of-sparta-attacks-BhBwQnkXDC4</loc>
<lastmod>2026-03-12T22:21:11.222Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/fool-me-once-fool-me-twice-hacking-norwegian-banks-IIH4qR_X3Hs</loc>
<lastmod>2026-03-12T22:23:42.012Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/hacking-millions-of-modems-MmpkfM8I33Q</loc>
<lastmod>2026-03-12T22:25:20.657Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/finding-0days-in-vilo-home-routers-IyInMgXj4k4</loc>
<lastmod>2026-03-12T22:27:09.181Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/hytrack-tracking-you-across-apps-and-the-web-hydra-style-ehVAlesTcO0</loc>
<lastmod>2026-03-11T18:14:41.105Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/mapping-the-landscape-top-10-cybersecurity-trends-in-critical-infrastructure-for-2024-MIbQf08H5so</loc>
<lastmod>2026-03-12T22:29:02.453Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/fine-grained-authorisation-with-relationship-based-access-control-H8Y-j0sYqvo</loc>
<lastmod>2026-03-12T22:30:38.809Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/inside-dash-cam-custom-protocols-and-discovered-zero-days-8e1vRFpP72w</loc>
<lastmod>2026-03-12T22:32:18.232Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/symbol-recovery-in-stripped-binaries--re_QOQoILY</loc>
<lastmod>2026-03-12T22:33:43.723Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/discovering-and-exploiting-local-attacks-against-1password-for-macos-5S_1uHLn4SI</loc>
<lastmod>2026-03-12T22:35:25.168Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/efficient-bug-bounty-automation-techniques-120iDYzscD4</loc>
<lastmod>2026-03-12T22:37:33.903Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/cybersecurity-schoolhouse-rock-BE0va6f3QwE</loc>
<lastmod>2026-03-12T22:39:00.897Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/grand-theft-actions-abusing-self-hosted-github-runners-at-scale-5P7KatZBr_I</loc>
<lastmod>2026-03-12T22:41:08.710Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/differential-privacy-beyond-algorithms-challenges-for-successful-deployment-3kA6oLhPbbs</loc>
<lastmod>2026-03-12T22:43:20.350Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/hacking-corporate-banking-for-fun-and-profit-0FfTWEP79k4</loc>
<lastmod>2026-03-12T22:44:50.382Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/ntlm-the-gift-that-keeps-on-giving-7IrPkH7kK2I</loc>
<lastmod>2026-03-12T22:46:35.991Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/threat-modelling-the-basics-3Cdh73vvEik</loc>
<lastmod>2026-03-12T22:47:54.014Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/def-con-32-hacker-jeopardy-night-1-jfX4YIWScoo</loc>
<lastmod>2026-03-12T22:51:46.875Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/white-rabbit-neo-open-source-red-teaming-ai-i0cXyiZv_qc</loc>
<lastmod>2026-03-12T22:52:57.316Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/inshittification-the-economics-of-digital-platforms-4EmstuO0Em8</loc>
<lastmod>2026-03-12T22:54:49.776Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/sdr-based-aircraft-and-radio-signal-interception-G9hAgitK-wE</loc>
<lastmod>2026-03-12T22:57:04.275Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/physical-security-and-lockpicking-basics-yrnXRmONOlE</loc>
<lastmod>2026-03-12T23:00:04.320Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/def-con-32-video-team-iot-with-ken-pyle-S2e6RFpptEE</loc>
<lastmod>2026-03-12T23:00:55.935Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/black-hat-usa-2025-or-vulnerability-haruspicy-picking-out-risk-signals-from-scoring-system-entrails-CW0Awo7pN5M</loc>
<lastmod>2026-03-13T05:11:19.321Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/black-hat-usa-2025-or-advanced-bypass-techniques-and-a-novel-detection-approach-jjiE9XzJo0M</loc>
<lastmod>2026-03-13T05:11:58.799Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/black-hat-usa-2025-or-how-tree-of-ast-redefines-the-boundaries-of-dataflow-analysis-VNBEoLE_bGA</loc>
<lastmod>2026-03-13T05:12:38.628Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/black-hat-usa-2025-or-digital-dominoes-scanning-the-internet-to-expose-systemic-cyber-risk-sPyhJykSLUw</loc>
<lastmod>2026-03-13T05:13:17.714Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/black-hat-usa-2025-or-detecting-taint-style-vulnerabilities-in-microservice-structured-web-apps-DhJphVrsof4</loc>
<lastmod>2026-03-13T05:13:55.776Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/black-hat-usa-2025-or-death-by-noise-abusing-alert-fatigue-to-bypass-the-soc-edr-edition-Xd4y4hkXprE</loc>
<lastmod>2026-03-13T05:14:32.139Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/black-hat-usa-or-llms-driven-automated-yara-rules-generation-with-explainable-file-features-and-dnahash-0i8UhpUgw_0</loc>
<lastmod>2026-03-13T05:15:08.620Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/black-hat-usa-2025-or-invoking-gemini-for-workspace-agents-with-a-simple-google-calendar-invite-nmMUMzLxBkU</loc>
<lastmod>2026-03-13T05:15:44.472Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/black-hat-usa-2025-or-reinventing-agentic-ai-security-with-architectural-controls-iLX4OdAEznY</loc>
<lastmod>2026-03-13T05:16:20.677Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/black-hat-usa-2025-or-use-and-abuse-of-palo-altos-remote-access-solution-6IGmNLs4tk8</loc>
<lastmod>2026-03-13T05:16:57.064Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/black-hat-usa-2025-or-turning-camera-surveillance-on-its-axis-7J7UgLwrxdQ</loc>
<lastmod>2026-03-13T05:17:33.777Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/black-hat-usa-2025-or-uncovering-threats-and-exposing-vulnerabilities-in-next-gen-cellular-ran-rqzK1xd3wng</loc>
<lastmod>2026-03-13T05:18:10.529Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/black-hat-usa-2025-or-lost-and-found-the-hidden-risks-of-account-recovery-in-a-passwordless-future-PtVGiROEBAM</loc>
<lastmod>2026-03-13T05:19:24.118Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/black-hat-usa-2025-or-breaking-chains-hacking-android-key-attestation-RUHDSokGhLE</loc>
<lastmod>2026-03-13T05:20:01.543Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/black-hat-usa-2025-or-pwning-user-phishing-training-through-scientific-lure-crafting-YKHlOHhKsvI</loc>
<lastmod>2026-03-13T05:20:38.297Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/black-hat-usa-2025-or-uncovering-nasty-5g-baseband-vulnerabilities-through-dependency-aware-fuzzing-gXGIo5fy800</loc>
<lastmod>2026-03-13T05:21:14.710Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/black-hat-usa-2025-or-if-google-uses-it-to-find-webpages-we-can-use-it-to-find-fraudsters-WVHxCedkYSg</loc>
<lastmod>2026-03-13T05:21:51.861Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/black-hat-usa-2025-or-let-llm-learn-when-your-static-analyzer-actually-gets-it-FPzOgf2EGQE</loc>
<lastmod>2026-03-13T05:22:29.242Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/black-hat-usa-2025-or-wormable-zero-click-rce-in-airplay-impacts-billions-of-apple-and-iot-devices-cNCSml35wLU</loc>
<lastmod>2026-03-13T05:23:05.365Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/black-hat-usa-2025-or-watching-the-watchers-exploring-and-testing-defenses-of-anti-cheat-systems-lAW2mAl96KI</loc>
<lastmod>2026-03-13T05:23:42.172Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/black-hat-usa-2025-or-the-first-30-months-of-psychological-manipulation-of-humans-by-ai-XOMJcT-DrlY</loc>
<lastmod>2026-03-13T05:24:22.372Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/black-hat-usa-2025-or-conjuring-hardware-failures-to-breach-cpu-privilege-boundaries-MMaRq6ac41c</loc>
<lastmod>2026-03-13T05:24:59.442Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/black-hat-usa-2025-keynote-or-from-slide-rules-to-genai-bARa6fr8frU</loc>
<lastmod>2026-03-13T05:25:35.600Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/black-hat-usa-2025-or-enhancing-command-line-classification-with-benign-anomalous-data-om5x9aFrnLE</loc>
<lastmod>2026-03-13T05:26:12.495Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/black-hat-usa-2025-or-facade-high-precision-insider-threat-detection-using-contrastive-learning-3CV1efZSHmQ</loc>
<lastmod>2026-03-13T05:26:52.626Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/black-hat-usa-2025-or-breaking-out-of-the-ai-cage-pwning-ai-providers-with-nvidia-vulnerabilities-5RH0StmV7Eo</loc>
<lastmod>2026-03-13T05:27:30.576Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/black-hat-usa-2025-or-autonomous-timeline-analysis-and-threat-hunting-an-ai-agent-for-timesketch-9EA7kz4bGvQ</loc>
<lastmod>2026-03-13T05:28:11.458Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/black-hat-usa-2025-or-ai-enterprise-compromise-0click-exploit-methods-M_BDq2hTJxU</loc>
<lastmod>2026-03-13T05:28:59.313Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/black-hat-usa-2025-or-vaulted-severance-your-secrets-are-now-outies-KC-8DhS8x5Q</loc>
<lastmod>2026-03-13T05:29:38.670Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/black-hat-usa-2025-or-a-fireside-chat-with-cognitive-scientist-and-ai-expert-gary-marcus-e69OE0ZjskA</loc>
<lastmod>2026-03-13T05:30:16.923Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/black-hat-usa-2025-or-advanced-active-directory-to-entra-id-lateral-movement-techniques-rzfAutv6sB8</loc>
<lastmod>2026-03-13T05:33:20.753Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/black-hat-usa-2025-keynote-or-chronicles-of-counter-intelligence-from-the-citizen-lab-frmGzgBvGdg</loc>
<lastmod>2026-03-13T05:33:56.734Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/securing-america-readiness-response-and-resilience-for-critical-infrastructure-defense-XxQFNgqcJB8</loc>
<lastmod>2026-03-13T05:34:42.168Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/black-hat-usa-2025-or-keynote-threat-modeling-and-constitutional-law-H0bM5q5TtC0</loc>
<lastmod>2026-03-13T05:35:19.092Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/black-hat-usa-2025-or-leveraging-jamf-for-red-teaming-in-enterprise-environments-IDFeNbz2lI4</loc>
<lastmod>2026-03-13T05:35:56.980Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/black-hat-usa-2025-or-ai-agents-for-offsec-with-zero-false-positives-8voNmYCUXSk</loc>
<lastmod>2026-03-13T05:36:33.561Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/black-hat-usa-2025-or-llm-driven-reasoning-for-automated-vulnerability-discovery-behind-hall-of-fame-WVjnipkKp4U</loc>
<lastmod>2026-03-13T05:37:10.779Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/black-hat-usa-2025-or-bypassing-pqc-signature-verification-with-fault-injection-JS30uepSuMo</loc>
<lastmod>2026-03-13T05:37:46.674Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/2-cops-2-broadcasting-tetra-end-to-end-under-scrutiny-oUhb2tTgmgg</loc>
<lastmod>2026-03-13T05:38:22.823Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/adversarial-fuzzer-for-teleoperation-commands-evaluating-autonomous-vehicle-resilience-kmPhJAz-5Rc</loc>
<lastmod>2026-03-13T05:38:59.570Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/no-hoodies-here-organized-crime-in-adtech-o7jlWJ8_Xuc</loc>
<lastmod>2026-03-13T05:39:36.763Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/the-5g-titanic-AZ4y3ODsVW4</loc>
<lastmod>2026-03-13T05:40:12.752Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/black-hat-usa-2025-or-windows-hell-no-for-business-SkWZ5KcelD4</loc>
<lastmod>2026-03-13T05:41:24.952Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/weaponization-of-cellular-based-iot-technology-leveraging-smart-devices-to-gain-a-foothold-eadubgujxGc</loc>
<lastmod>2026-03-13T05:42:04.247Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/e-trojans-ransomware-tracking-dos-and-data-leaks-on-xiaomi-electric-scooters-k-UsaSfndQQ</loc>
<lastmod>2026-03-13T05:42:42.128Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/smart-charging-smarter-hackers-the-unseen-risks-of-iso-15118-_furvigQmxk</loc>
<lastmod>2026-03-13T05:43:19.217Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/shade-bios-unleashing-the-full-stealth-of-uefi-malware-t17YEHymwE4</loc>
<lastmod>2026-03-13T05:43:56.049Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/dark-corners-how-a-failed-patch-left-vmware-esxi-vm-escapes-open-for-two-years-MhQmaK8Zsfw</loc>
<lastmod>2026-03-13T05:44:32.915Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/not-sealed-practical-attacks-on-nostr-a-decentralized-censorship-resistant-protocol-O97xhyHFSsw</loc>
<lastmod>2026-03-13T05:45:09.113Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/tracking-the-tractors-analyzing-smart-farming-automation-systems-for-fun-and-profit-OxnY_25suS8</loc>
<lastmod>2026-03-13T05:56:01.288Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/dead-pixel-detected-a-security-assessment-of-apples-graphics-subsystem-JYmh7gCoIFo</loc>
<lastmod>2026-03-13T05:56:38.067Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/decoding-signal-understanding-the-real-privacy-guarantees-of-e2ee-CxnBO2gxMyI</loc>
<lastmod>2026-03-13T05:57:13.887Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/booting-into-breaches-hunting-windows-secureboots-remote-attack-surfaces-p4EXzE0dvWE</loc>
<lastmod>2026-03-13T05:57:50.556Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/unix-underworld-tales-from-the-dark-side-of-zos-3wQHhGxVTuo</loc>
<lastmod>2026-03-13T05:58:27.224Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/black-hat-usa-2025-or-abusing-entra-oauth-for-fun-and-access-to-internal-microsoft-applications-sWV_3k-_S7Y</loc>
<lastmod>2026-03-13T05:59:03.256Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/black-hat-usa-2025-or-cross-origin-web-attacks-via-http2-server-push-and-signed-http-exchange-IeHGk34HG3k</loc>
<lastmod>2026-03-13T05:59:40.224Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/black-hat-usa-2025-or-unmasking-supply-chain-attacks-via-application-behaviour-UGB5W-yJCrQ</loc>
<lastmod>2026-03-13T06:00:18.113Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/llm-identifies-information-stealer-infection-vector-and-extracts-iocs-WQFIfORignI</loc>
<lastmod>2026-03-13T06:00:54.305Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/leaking-privileged-memory-from-any-intel-system-using-a-microarchitectural-race-condition-ULXuhxj-WgA</loc>
<lastmod>2026-03-13T06:01:30.717Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/more-flows-more-bugs-empowering-sast-with-llms-and-customized-dfa-Zp0x-cfClPY</loc>
<lastmod>2026-03-13T06:02:06.894Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/a-collection-of-vulnerabilities-that-will-end-your-space-mission-uLZab4pe4X0</loc>
<lastmod>2026-03-13T06:02:45.411Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/im-in-your-logs-now-deceiving-your-analysts-and-blinding-your-edr-G3Ft0gtmm4I</loc>
<lastmod>2026-03-13T06:03:26.603Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/universal-and-context-independent-triggers-for-precise-control-of-llm-outputs-W8zzpTGVHRE</loc>
<lastmod>2026-03-13T06:04:10.921Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/http11-must-die-the-desync-endgame-FJbuAyxTTWc</loc>
<lastmod>2026-03-13T06:04:52.863Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/black-hat-usa-2025-or-xunprotect-reverse-engineering-macos-xprotect-remediator-1pJWqtBxb50</loc>
<lastmod>2026-03-13T06:05:35.234Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/black-hat-usa-2025-or-weaponizing-apple-ai-for-offensive-operations-UooCY59nQSQ</loc>
<lastmod>2026-03-13T06:06:15.941Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/black-hat-usa-2025-or-no-vpn-needed-cryptographic-attacks-against-the-opc-ua-protocol-OtTiz0Xvyw0</loc>
<lastmod>2026-03-13T06:06:56.766Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/black-hat-usa-2025-or-lost-in-translation-exploiting-unicode-normalization-ETB2w-f3pM4</loc>
<lastmod>2026-03-13T06:07:35.702Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/black-hat-usa-2025-or-new-red-teams-networking-techniques-for-initial-access-and-evasion-terPgwzk3dc</loc>
<lastmod>2026-03-13T06:08:20.511Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/black-hat-usa-2025-or-unveiling-hidden-preauth-vulnerabilities-in-windows-http-services-CD-1s2uBqmQ</loc>
<lastmod>2026-03-13T06:09:01.122Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/black-hat-usa-or-derandomizing-the-location-of-security-critical-kernel-objects-in-the-linux-kernel-nOXwh8BfRDo</loc>
<lastmod>2026-03-13T06:09:38.104Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/black-hat-usa-2025-or-clustered-points-of-failure-attacking-windows-server-failover-clusters-FSRmPwfMYs0</loc>
<lastmod>2026-03-13T06:10:14.134Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/black-hat-usa-2025-or-unveiling-the-hidden-perils-of-the-torchscript-engine-in-pytorch-rZ0Jnu5gtqo</loc>
<lastmod>2026-03-13T06:10:50.187Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/black-hat-usa-2025-or-quack-hindering-deserialization-attacks-via-static-duck-typing-hrtVuYfswCg</loc>
<lastmod>2026-03-13T06:11:27.594Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/black-hat-usa-2025-or-how-kcfg-and-kcet-redefine-control-flow-integrity-in-the-windows-kernel-LflYlvJ4vSU</loc>
<lastmod>2026-03-13T06:12:04.173Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/the-11th-annual-black-hat-usa-network-operations-center-noc-report-iliF2BodvOc</loc>
<lastmod>2026-03-13T06:12:40.968Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/back-to-the-future-hacking-and-securing-connection-based-oauth-architectures-__NtTfL0oPw</loc>
<lastmod>2026-03-13T06:13:18.323Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/azures-weakest-link-how-api-connections-spill-secrets-rpAZz0uY2ac</loc>
<lastmod>2026-03-13T06:13:55.204Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/applestorm-unmasking-the-privacy-risks-of-apple-intelligence-iL2McWODDnc</loc>
<lastmod>2026-03-13T06:14:32.441Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/black-hat-usa-2025-keynote-or-nicole-perlroth-or-the-new-frontline-cyber-on-the-precipice-4C1UL5sO_ME</loc>
<lastmod>2026-03-13T06:15:09.086Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/black-hat-usa-2025-keynote-or-mikko-hypponen-or-three-decades-in-cybersecurity-H14EhT-DRJ8</loc>
<lastmod>2026-03-13T06:15:46.092Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/the-black-hat-usa-2025-startup-spotlight-competition-FLCb1SHIrtk</loc>
<lastmod>2026-03-13T06:16:32.741Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/black-hat-briefings-speaker-orientation-meeting-recording-ePB3TcCb3e8</loc>
<lastmod>2026-03-13T06:17:12.733Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/a-closer-look-at-the-gaps-in-the-grid-new-vulnerabilities-and-exploits-affecting-solar-power-systems-EzUGIVJx9EM</loc>
<lastmod>2026-03-13T06:29:19.127Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/breaking-dna-cooking-malware-in-the-lab-J-gKGUzlqPE</loc>
<lastmod>2026-03-14T19:41:22.277Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/behind-closed-doors-bypassing-rfid-readers-0NCnjx5wuns</loc>
<lastmod>2026-03-13T06:30:33.011Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/mini-app-but-great-impact-new-ways-to-compromise-mobile-apps-J5Jn0-FsAc8</loc>
<lastmod>2026-03-13T06:31:46.040Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/invisible-ink-privacy-risks-of-css-on-the-web-and-in-emails-em7Mja6CNwY</loc>
<lastmod>2026-03-13T06:33:00.179Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/making-malware-analysis-less-scary-HVsIWgnMPuQ</loc>
<lastmod>2026-03-14T19:43:04.749Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/when-java-plays-unsafe-how-a-single-mistake-can-break-memory-safety-xy46UYWCo2E</loc>
<lastmod>2026-03-14T19:49:11.571Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/foreign-information-manipulation-and-interference-disinformation-20-JjtF7gbguC4</loc>
<lastmod>2026-03-13T06:34:12.829Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/enhancing-modern-threat-intelligence-the-pivotal-role-of-large-language-models-in-extracting-actionable-ttp-attack-chains-7S3OSvWXP0I</loc>
<lastmod>2026-03-13T06:34:48.854Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/the-illusion-of-isolation-how-isolation-failures-in-cicd-servers-lead-to-rce-and-privacy-risks-VdzduFZi-GI</loc>
<lastmod>2026-03-13T06:36:02.801Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/persistence-pays-from-flames-to-firewalls-Pe5kpPjk2qA</loc>
<lastmod>2026-03-14T19:44:48.398Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/the-oversights-under-the-flow-discovering-and-demystifying-the-vulnerable-tooling-suites-from-azure-mlops-s49sgre_04c</loc>
<lastmod>2026-03-13T06:37:55.457Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/vcenter-lost-how-the-dcerpc-vulnerabilities-changed-the-fate-of-esxi-GOXhztVXw4c</loc>
<lastmod>2026-03-13T06:39:10.355Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/drivethru-car-hacking-bkCLm4dnQfQ</loc>
<lastmod>2026-03-13T06:40:23.513Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/cdn-cannon-exploiting-cdn-back-to-origin-strategies-for-amplification-attacks-ZEz9_vVspoo</loc>
<lastmod>2026-03-13T06:28:42.740Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/standing-on-the-shoulders-of-giants-deobfuscating-webassembly-using-llvm-Z-udrjM7Z78</loc>
<lastmod>2026-03-13T06:29:55.707Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/misadventures-with-copilot-attacking-and-exploiting-windows-npu-drivers-K_C5-wZCAN0</loc>
<lastmod>2026-03-13T06:31:09.658Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/wash-your-phone-usb-based-file-access-attacks-on-mobile-devices-UYKet66vLsg</loc>
<lastmod>2026-03-13T06:32:22.467Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/kernjc-automated-vulnerable-environment-generation-for-linux-kernel-vulnerabilities-Xmig8oWzlrk</loc>
<lastmod>2026-03-13T06:33:36.807Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/determining-exploitability-of-vulnerabilities-with-sbom-and-vex-WEbGWfrp1V4</loc>
<lastmod>2026-03-13T06:35:25.476Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/double-tap-at-the-blackbox-hacking-a-car-remotely-twice-with-mitm-KLvWZJumBVQ</loc>
<lastmod>2026-03-13T06:36:41.243Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/bridging-the-gap-type-confusion-and-boundary-vulnerabilities-between-webassembly-and-javascript-in-v8-3mBm0LuliYo</loc>
<lastmod>2026-03-13T06:37:18.269Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/obfusqate-the-quantum-code-shield-5mDNZNGLlsE</loc>
<lastmod>2026-03-13T06:38:32.944Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/quickshell-rce-attack-chain-on-quick-share-wRH4SK477Lc</loc>
<lastmod>2026-03-13T06:39:47.112Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/bestfit-unveiling-hidden-transformers-in-windows-ansi-sKH8283CFzs</loc>
<lastmod>2026-03-13T17:42:47.253Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/wi-fi-calling-revealing-downgrade-attacks-and-not-so-private-private-keys-iBlPlXRxHF0</loc>
<lastmod>2026-03-13T17:44:24.355Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/the-cvss-deception-how-weve-been-misled-on-vulnerability-severity-qQuaBB5tg8U</loc>
<lastmod>2026-03-13T17:46:28.354Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/infusing-ai-in-cybersecurity-the-times-they-are-ai-changin-mBCZEIUQCRc</loc>
<lastmod>2026-03-13T18:29:00.875Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/the-bugs-in-your-bootloaders-embedded-device-secure-boot-fails-and-how-to-fix-them-eZczwNFzxus</loc>
<lastmod>2026-03-13T17:47:58.332Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/the-double-ai-agent-2xGcqDmkkf8</loc>
<lastmod>2026-03-13T17:49:55.834Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/unmasking-state-sponsored-mobile-surveillance-malware-AkNzyvGbB50</loc>
<lastmod>2026-03-13T17:52:32.685Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/unc1860-and-the-temple-of-oats-ijHL3V08Z2I</loc>
<lastmod>2026-03-13T17:54:41.078Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/improving-side-channel-protections-for-intel-tdx-xWsWwp83i_U</loc>
<lastmod>2026-03-13T18:31:02.806Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/when-remote-shells-fall-into-the-same-hole-rooting-draytek-routers-before-attackers-can-do-it-again-tgfaEtQd8s4</loc>
<lastmod>2026-03-13T17:56:25.899Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/vulnerabilities-in-the-esim-download-protocol-v0muR5UGFB8</loc>
<lastmod>2026-03-13T17:57:57.719Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/lessons-and-lulz-the-black-hat-europe-noc-report-X-9jPKwwL8w</loc>
<lastmod>2026-03-13T17:59:48.679Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/security-analysis-of-residential-gateways-and-isps-7qBIba8ah6o</loc>
<lastmod>2026-03-13T18:03:42.586Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/redefining-the-origin-of-secrecy-in-a-post-quantum-world-dxJfjcQPZo8</loc>
<lastmod>2026-03-13T18:05:10.881Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/reasonable-regs-vs-red-tape-how-should-governments-tackle-the-cyber-intrusion-market-UmR1xzhWnrg</loc>
<lastmod>2026-03-13T18:07:16.276Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/parse-me-baby-one-more-time-bypassing-html-sanitizer-via-parsing-differentials-VdLMW3um3ZA</loc>
<lastmod>2026-03-13T18:08:54.515Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/over-the-air-compromise-of-modern-volkswagen-group-vehicles-gSudZtBIyX4</loc>
<lastmod>2026-03-13T18:10:48.773Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/operation-midas-tracking-fraudulent-financial-program-organizations-rMjlt8v-0eY</loc>
<lastmod>2026-03-13T18:12:49.005Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/mind-the-data-gap-privacy-challenges-in-autonomous-ai-agents--C2-_of1oQs</loc>
<lastmod>2026-03-13T18:14:53.395Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/understanding-and-reducing-supply-chain-software-and-vulnerability-risks-miDslKwJ1PM</loc>
<lastmod>2026-03-13T18:16:30.085Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/locknote-ai-and-security-research-uGjV3hkiCrw</loc>
<lastmod>2026-03-13T18:18:03.777Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/llms-at-the-core-from-attention-to-action-in-scaling-security-teams-iww0ZSNxiyo</loc>
<lastmod>2026-03-13T19:57:59.538Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/llmbotomy-shutting-the-trojan-backdoors-Zbo4I0IKhTs</loc>
<lastmod>2026-03-13T18:19:30.671Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/the-geopolitics-of-internet-data-routes-CfY5oqa1jQ0</loc>
<lastmod>2026-03-13T18:21:04.660Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/fighting-cybercrime-in-2024-FhJNMUCVvAA</loc>
<lastmod>2026-03-13T18:22:46.706Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/is-your-memory-protected-uncovering-hidden-vulnerabilities-in-automotive-mpus-j3FdduSSeQc</loc>
<lastmod>2026-03-13T18:24:49.904Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/javascript-as-input-a-new-attack-surface-in-cloud-microservices-0cgLdQBqMm0</loc>
<lastmod>2026-03-13T18:26:49.031Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/how-the-internet-dodged-a-bullet-the-keytrap-denial-of-service-attacks-against-dnssec-I_nerFxSmBQ</loc>
<lastmod>2026-03-13T18:32:26.875Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/enhancing-automatic-vulnerability-discovery-for-windows-rpccom-VQiQuLo0v58</loc>
<lastmod>2026-03-13T18:34:00.189Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/guest-revolution-chaining-3-bugs-to-compromise-the-windows-kernel-from-the-vmware-guest-DtoeGNhybgE</loc>
<lastmod>2026-03-13T18:35:49.819Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/from-pass-the-hash-to-code-execution-on-schneider-electric-m340-plcs-RL7vtbm03Os</loc>
<lastmod>2026-03-13T18:37:47.703Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/diving-into-spooler-discovering-lpe-and-rce-vulnerabilities-in-windows-printer-driver-OCl0V5JdD7Q</loc>
<lastmod>2026-03-13T18:39:32.345Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/defending-off-the-land-agentless-defenses-available-today-Brd-p6N0alI</loc>
<lastmod>2026-03-13T18:41:52.847Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/decoding-em-fi-attacks-lessons-learned-from-glitching-the-gigadevice-gd32f407-gktZDgY-3cY</loc>
<lastmod>2026-03-13T18:44:13.341Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/codecloak-a-drl-based-method-for-mitigating-code-leakage-by-llm-code-assistants-Nv2rRkVvzKY</loc>
<lastmod>2026-03-13T18:45:54.174Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/navigating-the-complex-challenges-of-setting-up-efficient-and-secure-ot-soc-capabilities-mWgMtkhz39E</loc>
<lastmod>2026-03-13T22:19:38.392Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/breaking-matter-vulnerabilities-in-the-matter-protocol-TLefYKS7BBs</loc>
<lastmod>2026-03-13T18:47:51.004Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/blast-radius-breaking-enterprise-network-authentication-dagyATfzRFo</loc>
<lastmod>2026-03-13T18:49:27.716Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/aml-injection-attacks-on-confidential-vms-xiirxSDkMBs</loc>
<lastmod>2026-03-13T18:50:58.484Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/unveiling-the-power-of-intune-leveraging-intune-for-breaking-into-your-cloud-and-on-premise-YX5P99JUwlw</loc>
<lastmod>2026-03-13T18:52:45.158Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/chinese-apt-a-master-of-exploiting-edge-devices-PSaix1C-UMI</loc>
<lastmod>2026-03-13T20:13:40.787Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/the-insecure-iot-cloud-strikes-again-rce-on-all-ruijie-cloud-connected-devices-ZhO4n5PAXfk</loc>
<lastmod>2026-03-13T18:54:17.224Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/the-devil-is-in-the-micro-architectures-uncovering-new-side-channel-and-bit-flip-attack-surfaces-in-dnn-executables-ywm5krs1GEs</loc>
<lastmod>2026-03-13T18:56:09.913Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/sysbumps-exploiting-speculative-execution-in-system-calls-for-breaking-kaslr-in-macos-for-apple-silicon--WO_1EKkdJk</loc>
<lastmod>2026-03-13T18:57:44.742Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/spalware-and-more-advanced-prompt-injection-exploits-84NVG1c5LRI</loc>
<lastmod>2026-03-13T18:59:29.876Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/my-other-classloader-is-your-classloader-9D-hLsrY-uE</loc>
<lastmod>2026-03-13T19:01:08.471Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/heartbeat-havoc-unveiling-remote-vulnerabilities-in-windows-network-load-balancing-T0x--ahWyoo</loc>
<lastmod>2026-03-13T19:03:24.978Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/exposing-the-dark-corners-of-sap-4-years-of-threat-intelligence-data-analyzed-cIG8NZhodpg</loc>
<lastmod>2026-03-13T19:04:53.838Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/apple-disk-o-party-QhEkm5VYo0s</loc>
<lastmod>2026-03-13T19:06:55.013Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/terrapin-attack-breaking-ssh-channel-integrity-by-sequence-number-manipulation-JZiEaF7XT4o</loc>
<lastmod>2026-03-13T23:06:19.906Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/a-novel-attack-surface-java-authentication-and-authorization-service-jaas-2FwUAVmUUVY</loc>
<lastmod>2026-03-13T19:09:32.658Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/how-to-read-and-write-a-high-level-bytecode-decompiler-H-7ZNrpsV50</loc>
<lastmod>2026-03-13T19:12:16.612Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/opening-keynote-black-hat-asia-2024-H3ax03H4I4g</loc>
<lastmod>2026-03-13T19:14:14.823Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/black-hat-europe-24-speaker-coaching-program-orientation-call-AItfFvjbVro</loc>
<lastmod>2026-03-13T19:10:44.899Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/black-hat-eu-2024-speaker-orientation-meeting-recording-_-8Pu0MhmVE</loc>
<lastmod>2026-03-13T19:10:29.509Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/ai-governance-and-security-a-conversation-with-singapores-chief-ai-officer-Z28TuWM0pbE</loc>
<lastmod>2026-03-13T19:17:21.034Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/linkdoor-a-hidden-attack-surface-in-the-android-netlink-kernel-modules-vqBC_WtDc6Q</loc>
<lastmod>2026-03-13T19:19:29.327Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/what-the-trustzone-m-doesnt-see-the-mcu-does-grieve-over-lessons-learned-from-assessing-a-microcontroller-tee-o_-a-_oqCgU</loc>
<lastmod>2026-03-13T19:22:59.194Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/the-hackdac-story-learnings-from-organizing-the-worlds-largest-hardware-hacking-competition-6S86MskqywE</loc>
<lastmod>2026-03-13T19:24:48.079Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/privacy-detective-sniffing-out-data-leaks-for-android-Krvi3bCXlCA</loc>
<lastmod>2026-03-13T19:26:13.689Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/leveraging-a-firmware-modification-attack-for-remote-debugging-of-siemens-s7-plcs-ZE2OGQLwq-A</loc>
<lastmod>2026-03-13T19:27:39.307Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/the-final-chapter-unlimited-ways-to-bypass-your-macos-privacy-mechanisms-Px3uzzQxdag</loc>
<lastmod>2026-03-13T19:29:24.559Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/identifying-syscall-guard-variables-for-data-only-attacks-utjtAxagbr8</loc>
<lastmod>2026-03-13T19:30:59.246Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/faults-in-our-bus-novel-bus-fault-attacks-to-break-arm-trustzone-aXGV2qSgPP8</loc>
<lastmod>2026-03-13T19:32:43.676Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/analyzing-an-nso-pegasus-spyware-sample-wAmGU2YUa9Y</loc>
<lastmod>2026-03-13T19:34:26.240Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/voice-phishing-syndicates-unmasked-an-in-depth-investigation-and-exposure-QDHimyzoSuY</loc>
<lastmod>2026-03-13T19:36:05.129Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/urb-excalibur-the-new-vmware-all-platform-vm-escapes-5zUhrhkubhI</loc>
<lastmod>2026-03-13T19:37:43.136Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/use-your-spell-against-you-a-proactive-threat-prevention-of-smart-contract-exploit-Gqxc9zf0OZY</loc>
<lastmod>2026-03-13T23:38:14.648Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/unveiling-the-cracks-in-virtualization-mastering-the-host-system-gzFUtG-n65A</loc>
<lastmod>2026-03-13T19:39:36.889Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/the-key-to-remote-vehicle-control-autonomous-driving-domain-controller-ueXlsoc7LUs</loc>
<lastmod>2026-03-13T19:41:16.562Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/the-hole-in-sandbox-escape-modern-web-based-app-sandbox-from-site-isolation-perspective-ktMNplx1eG4</loc>
<lastmod>2026-03-13T19:42:51.567Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/the-fault-in-our-metrics-rethinking-how-we-measure-detection-and-response-vbfW1NIudhY</loc>
<lastmod>2026-03-13T19:45:53.178Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/the-dark-side-of-edr-repurpose-edr-as-an-offensive-tool-2qbZ33zSHz8</loc>
<lastmod>2026-03-13T19:47:49.871Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/lessons-and-lulz-the-black-hat-asia-noc-report-8SvBZzxcFuk</loc>
<lastmod>2026-03-13T19:49:52.596Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/systemui-as-evilpip-the-hijacking-attacks-on-modern-mobile-device-47lDlfsji8Y</loc>
<lastmod>2026-03-13T19:51:50.493Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/operation-poisonedapple-tracing-credit-card-information-theft-to-payment-fraud-unjaZGT14cs</loc>
<lastmod>2026-03-13T19:53:42.615Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/magicdot-a-hackers-magic-show-of-disappearing-dots-and-spaces-ZgQ0CVw0fcE</loc>
<lastmod>2026-03-13T19:56:05.981Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/llm4shell-discovering-and-exploiting-rce-vulnerabilities-in-real-world-llm-integrated-frameworks-and-apps-LcLrG_4i19E</loc>
<lastmod>2026-03-13T19:59:44.382Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/immoral-fiber-unlocking-and-discovering-new-offensive-capabilities-of-fibers-LdrqX5Nhe94</loc>
<lastmod>2026-03-13T20:01:12.102Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/how-to-make-hugging-face-to-hug-worms-discovering-and-exploiting-unsafe-pickleloads-over-pre-trained-large-model-hubs-KtbeMz2UHN0</loc>
<lastmod>2026-03-13T20:02:46.613Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/game-of-cross-cache-lets-win-it-in-a-more-effective-way-em9qgHm3uIk</loc>
<lastmod>2026-03-13T20:04:30.363Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/from-byovd-to-a-0-day-unveiling-advanced-exploits-in-cyber-recruiting-scams-sUysFseYIeg</loc>
<lastmod>2026-03-13T20:06:16.204Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/edr-erase-data-remotely-tSKNC2xEd1Y</loc>
<lastmod>2026-03-13T20:07:50.222Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/confused-learning-supply-chain-attacks-through-machine-learning-models-HJm-luyvVR8</loc>
<lastmod>2026-03-13T20:10:02.497Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/cloud-console-cartographer-tapping-into-mapping-bRNUMkcdCNU</loc>
<lastmod>2026-03-13T20:11:41.581Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/chinas-military-cyber-operations-has-the-strategic-support-force-come-of-age-braWTvU15QE</loc>
<lastmod>2026-03-13T20:15:13.352Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/certifieddcom-the-privilege-escalation-journey-to-domain-admin-with-dcom-JQP3ZfM1V0U</loc>
<lastmod>2026-03-13T20:16:52.141Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/bypassing-microsoft-entra-id-conditional-access-via-tpm-stored-key-abuse-JItnI6b9DII</loc>
<lastmod>2026-03-13T20:18:43.401Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/breaking-managed-identity-barriers-in-azure-services-SGp91luDA3k</loc>
<lastmod>2026-03-13T20:21:07.403Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/bad-randomness-protecting-against-cryptographys-perfect-crime-js-3OI1_65U</loc>
<lastmod>2026-03-13T20:22:47.619Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/back-to-the-roots-finding-the-origin-of-csp-security-bugs-KbVWEQeeMzI</loc>
<lastmod>2026-03-13T20:24:40.106Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/attacking-debug-modules-in-the-android-ecosystem-3lpMaFVvF64</loc>
<lastmod>2026-03-13T20:26:33.219Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/a-glimpse-into-the-protocol-fuzz-windows-rdp-client-for-fun-and-profit-I5_v3yRqMVM</loc>
<lastmod>2026-03-13T20:27:50.246Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/practical-llm-security-takeaways-from-a-year-in-the-trenches-Rhpqiunpu0c</loc>
<lastmod>2026-03-13T20:29:43.860Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/living-off-microsoft-copilot--YJgcTCSzU0</loc>
<lastmod>2026-03-13T20:32:01.046Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/the-future-of-privacy-and-software-engineering-MAJP-fAf8MI</loc>
<lastmod>2026-03-13T20:34:09.022Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/black-hat-usa-2024-review-board-lock-note-zbNU7kRw3tg</loc>
<lastmod>2026-03-13T20:36:49.054Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/project-zero-10-years-of-make-0-day-hard-Oy03K6o3iug</loc>
<lastmod>2026-03-13T20:39:04.903Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/secure-by-design-a-call-to-action-for-software-quality-itpZnfqu9eQ</loc>
<lastmod>2026-03-13T20:41:38.235Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/a-framework-for-evaluating-national-cybersecurity-strategies-D3KKYD0JPcc</loc>
<lastmod>2026-03-13T20:43:45.646Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/ace-up-the-sleeve-hacking-into-apples-usb-c-controller--uxmmlQr3lA</loc>
<lastmod>2026-03-13T20:45:59.744Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/achilles-heel-of-js-engines-exploiting-modern-browsers-during-wasm-execution-X2JQrQQmOLA</loc>
<lastmod>2026-03-13T20:47:48.864Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/all-your-secrets-belong-to-us-leveraging-firmware-bugs-to-break-tees-ra-Ef1QykwY</loc>
<lastmod>2026-03-13T20:50:21.359Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/arbitrary-data-manipulation-and-leakage-with-cpu-zero-day-bugs-on-risc-v-1AAZUd_Yk7U</loc>
<lastmod>2026-03-13T20:52:50.419Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/are-your-backups-still-immutable-even-though-you-cant-access-them-1o8nZGQ5idc</loc>
<lastmod>2026-03-13T20:54:40.060Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/attention-is-all-you-need-for-semantics-detection-a-novel-transformer-on-neural-symbolic-approach--PdQtTn6mf8</loc>
<lastmod>2026-03-13T20:56:17.577Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/our-security-skills-are-unbalanced-effective-communication-for-security-EUbsgyEDM2I</loc>
<lastmod>2026-03-13T20:58:26.538Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/behind-enemy-lines-engaging-and-disrupting-ransomware-web-panels--Xh5M_4DXFY</loc>
<lastmod>2026-03-13T20:59:54.951Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/breaching-aws-accounts-through-shadow-resources-iya0VJ-9qg0</loc>
<lastmod>2026-03-13T21:01:30.549Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/break-the-wall-from-bottom-automated-discovery-of-protocol-level-evasion-vulnerabilities-in-web-application-firewalls-RgBf7P2BkJM</loc>
<lastmod>2026-03-13T21:03:04.948Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/driving-forces-behind-industry-40-and-digital-transformation-for-critical-infrastructure-ffsrRKE5j9s</loc>
<lastmod>2026-03-13T21:20:25.283Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/bugs-of-yore-a-bug-hunting-journey-on-vmwares-hypervisor-CSVuSRKe15A</loc>
<lastmod>2026-03-13T21:04:53.121Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/bypassing-arms-memory-tagging-extension-with-a-side-channel-attack-DoPb4mG-7TY</loc>
<lastmod>2026-03-13T21:06:53.125Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/bytecode-jiu-jitsu-choking-interpreters-to-force-execution-of-malicious-bytecode-5fs9ntKOYW0</loc>
<lastmod>2026-03-13T21:08:38.526Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/compromising-confidential-compute-8Py7_uXVfyk</loc>
<lastmod>2026-03-13T21:10:11.943Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/confusion-attacks-exploiting-hidden-semantic-ambiguity-in-apache-http-server-euO9WbYHm0s</loc>
<lastmod>2026-03-13T21:12:11.666Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/cracking-the-5g-fortress-peering-into-5gs-vulnerability-abyss-nPaSsM0eZbo</loc>
<lastmod>2026-03-13T21:13:42.160Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/crashing-the-party-vulnerabilities-in-rpki-validation-mHbCFefRbU0</loc>
<lastmod>2026-03-13T21:15:10.260Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/cyber-claims-outlook-2024-trends-threats-and-tomorrows-challenges-WcgYT3UakmQ</loc>
<lastmod>2026-03-13T21:16:48.388Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/deep-backdoors-in-deep-reinforcement-learning-hcOmt9pHvao</loc>
<lastmod>2026-03-13T21:18:46.533Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/what-if-there-is-a-backdoor-in-your-uefi-orom-_S6EymfaBqQ</loc>
<lastmod>2026-03-13T23:39:48.779Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/ai-safety-and-security-a-panel-discussion-s9cLeHR8CBA</loc>
<lastmod>2026-03-13T21:21:56.183Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/foreign-information-manipulation-and-interference-disinformation-20-I5tZlIpWMWM</loc>
<lastmod>2026-03-13T21:23:53.389Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/bitsquatting-one-bit-flip-to-rule-them-all-7lUPTxNNxM0</loc>
<lastmod>2026-03-13T21:25:48.820Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/from-exploits-to-forensic-evidence-unraveling-the-unitronics-attack-l1A-OmPuOgE</loc>
<lastmod>2026-03-13T21:27:54.333Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/from-hal-to-halt-thwarting-skynets-siblings-in-the-genai-coding-era-uv4AD6ICcfE</loc>
<lastmod>2026-03-13T21:30:07.367Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/from-mlops-to-mloops-exposing-the-attack-surface-of-machine-learning-platforms-1dsRAEdbpq4</loc>
<lastmod>2026-03-13T21:31:49.940Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/from-weapon-to-target-quantum-computers-paradox-11W7ooklX7I</loc>
<lastmod>2026-03-13T21:33:46.243Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/gotta-cache-em-all-bending-the-rules-of-web-cache-exploitation-9gvxEhugnVM</loc>
<lastmod>2026-03-13T21:35:16.752Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/hardening-hsms-for-banking-grade-crypto-wallets-HpQP3lMg3iw</loc>
<lastmod>2026-03-13T21:36:55.582Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/into-the-inbox-novel-email-spoofing-attack-patterns-twu5Mw0y9ss</loc>
<lastmod>2026-03-13T21:45:49.616Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/hook-line-and-sinker-phishing-windows-hello-for-business-UnudlFeHlrU</loc>
<lastmod>2026-03-13T21:38:47.763Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/industrial-control-systems-and-iot-security-panel-Ifimg-1tsLo</loc>
<lastmod>2026-03-13T21:40:39.766Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/ignore-your-generative-ai-safety-instructions-violate-the-cfaa-cu-3Ul3VA48</loc>
<lastmod>2026-03-13T21:42:43.551Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/in-defense-of-facts-setting-standards-against-information-threats-o1NG6Pecewg</loc>
<lastmod>2026-03-13T21:44:11.236Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/laser-beams-and-light-streams-letting-hackers-go-pew-pew-Wyv3pSQopp0</loc>
<lastmod>2026-03-13T21:55:05.057Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/is-defense-winning-measuring-if-cyberspace-is-becoming-more-defensible-and-resilient-ZYv_292wMa4</loc>
<lastmod>2026-03-13T21:47:57.076Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/isolation-or-hallucination-hacking-ai-infrastructure-providers-mhZ1It6lb4M</loc>
<lastmod>2026-03-13T21:49:45.099Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/securing-elections-a-global-perspective-vJxxzWgqlCQ</loc>
<lastmod>2026-03-13T21:51:34.281Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/kicking-in-the-door-to-the-cloud-exploiting-cloud-provider-vulnerabilities-for-initial-access-rykpVoAQiSI</loc>
<lastmod>2026-03-13T21:53:34.079Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/let-the-cache-cache-and-let-the-webassembly-assemble-knocking-on-chromes-shell-9aA0ajufsu4</loc>
<lastmod>2026-03-13T21:56:46.064Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/listen-to-the-whispers-web-timing-attacks-that-actually-work-LDy7-xBvsfo</loc>
<lastmod>2026-03-13T21:58:28.997Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/sonos-over-the-air-remote-kernel-exploitation-and-covert-wiretap-piw0CZ46-Q0</loc>
<lastmod>2026-03-13T22:00:13.811Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/living-off-microsoft-copilot-FH6P288i2PE</loc>
<lastmod>2026-03-13T22:02:11.732Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/solving-the-cyber-hard-problems-a-view-into-problem-solving-from-the-white-house-U03KN2fc904</loc>
<lastmod>2026-03-13T22:05:15.330Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/understanding-and-reducing-supply-chain-software-and-vulnerability-risks-js3SiZd5XNk</loc>
<lastmod>2026-03-13T22:06:45.895Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/low-energy-to-high-energy-hacking-nearby-ev-chargers-over-bluetooth-8gNhfR1YZGA</loc>
<lastmod>2026-03-13T22:08:59.015Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/locked-down-but-not-out-fighting-the-hidden-war-in-your-bootloader-pfr_sb4fyrI</loc>
<lastmod>2026-03-13T22:10:39.848Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/moral-hazards-and-ethical-considerations-in-cyber-insurance-yaxXBbRYG_g</loc>
<lastmod>2026-03-13T22:12:28.699Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/modern-anti-abuse-mechanisms-in-competitive-video-games-f8QaZkU55p8</loc>
<lastmod>2026-03-13T22:13:59.008Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/maldaptive-diving-deep-into-ldap-obfuscation-deobfuscation-and-detection-3HrGoSPT8cU</loc>
<lastmod>2026-03-13T22:16:00.261Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/microarchitecture-vulnerabilities-past-present-and-future-LIYZemVCgiM</loc>
<lastmod>2026-03-13T22:17:53.952Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/stealing-private-keys-from-s7-plcs-9AO24tqksRw</loc>
<lastmod>2026-03-13T22:21:12.051Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/one-hack-to-rule-them-all-pervasive-account-takeovers-in-integration-platforms-qrHEBElig3c</loc>
<lastmod>2026-03-13T22:22:57.182Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/ops-it-is-jtags-fault-journey-to-unlocking-automotive-grade-ics-FBlpBLT64c4</loc>
<lastmod>2026-03-13T22:24:45.885Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/overcoming-state-finding-baseband-vulnerabilities-by-fuzzing-layer-2-mXijb6ckU2c</loc>
<lastmod>2026-03-13T22:26:32.716Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/4-zero-days-leading-to-rce-lpe-and-kce-affecting-millions-of-openvpn-endpoints-kyvzZdowR3I</loc>
<lastmod>2026-03-13T22:28:13.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/pagejack-a-powerful-exploit-technique-with-page-level-uaf-uZW9RbZaq6A</loc>
<lastmod>2026-03-13T22:29:52.471Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/predict-prioritize-patch-how-microsoft-harnesses-llms-for-security-response-_rn5jETYBtk</loc>
<lastmod>2026-03-13T22:31:50.261Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/project-0xa11c-deoxidizing-the-rust-malware-ecosystem-cMIhIARmNfU</loc>
<lastmod>2026-03-13T22:33:50.099Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/burnout-my-invisible-adversary-NA0f5owyoko</loc>
<lastmod>2026-03-14T07:29:29.473Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/pylingual-a-python-decompilation-framework-for-evolving-python-versions-TJ65LrInHxw</loc>
<lastmod>2026-03-13T22:35:44.384Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/quantum-security-myths-facts-and-realities-qZlbAP94h78</loc>
<lastmod>2026-03-13T22:37:19.879Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/reinforcement-learning-for-autonomous-resilient-cyber-defence-HbadydHJs4I</loc>
<lastmod>2026-03-13T22:38:56.532Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/relationships-matter-reconstructing-the-organizational-and-social-structure-of-a-ransomware-gang-2hx4oq_kaI8</loc>
<lastmod>2026-03-13T22:40:50.833Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/remote-one-click-breaking-through-smartphones-via-a-non-well-known-remote-attack-surface-xITV0DpBVGo</loc>
<lastmod>2026-03-13T22:42:51.819Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/secure-shells-in-shambles-N-gZavGUKWs</loc>
<lastmod>2026-03-13T22:44:58.271Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/securing-network-appliances-new-technologies-and-old-challenges-j2yicbLVWhw</loc>
<lastmod>2026-03-13T22:46:45.232Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/self-hosted-github-runners-continuous-integration-continuous-destruction-GJhab1qXNig</loc>
<lastmod>2026-03-13T22:48:32.947Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/essential-strategies-for-infosec-in-avoiding-government-fallout-nN98kwL35I8</loc>
<lastmod>2026-03-13T22:50:18.413Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/snailload-anyone-on-the-internet-can-learn-what-youre-doing-YcldiAW6knk</loc>
<lastmod>2026-03-13T22:51:53.766Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/splitting-the-email-atom-exploiting-parsers-to-bypass-access-controls-Uky45wwqsO4</loc>
<lastmod>2026-03-13T22:53:50.794Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/surveilling-the-masses-with-wi-fi-positioning-systems-hlbjUvkoyBA</loc>
<lastmod>2026-03-13T22:55:56.437Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/surfacing-a-hydra-unveiling-a-multi-headed-chinese-state-sponsored-campaign-against-a-foreign-government-C_csnhjFZ4o</loc>
<lastmod>2026-03-13T22:57:43.960Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/super-hat-trick-exploit-chrome-and-firefox-four-times-VNTWm1iNhXY</loc>
<lastmod>2026-03-13T22:59:18.353Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/strengthen-cybersecurity-by-leveraging-cyber-insurance-XNvrLF3Pxys</loc>
<lastmod>2026-03-13T23:00:53.875Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/stop-sandboxing-exploitable-functions-and-modules-using-in-kernel-machine-learning-e4UgGe_-hnc</loc>
<lastmod>2026-03-13T23:02:52.935Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/swipe-left-for-identity-theft-an-analysis-of-user-data-privacy-risks-on-location-based-dating-apps-9MCKRP-16D8</loc>
<lastmod>2026-03-13T23:04:41.983Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/that-gambling-site-its-fueled-by-chinese-organized-crime-YUNeJZ4ENkY</loc>
<lastmod>2026-03-13T23:08:07.737Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/lessons-and-lulz-the-10th-annual-black-hat-usa-noc-report-63bUI-2APY4</loc>
<lastmod>2026-03-13T23:09:45.084Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/the-fundamentals-of-cyber-insurance-8FZUbcyEVpI</loc>
<lastmod>2026-03-13T23:11:22.997Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/the-way-to-android-root-exploiting-your-gpu-on-smartphone-Wr1Gio6X-O0</loc>
<lastmod>2026-03-13T23:13:21.302Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/the-hidden-treasure-of-crash-reports-35mdBRhulTQ</loc>
<lastmod>2026-03-13T23:15:10.820Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/the-gcp-jenga-tower-hacking-millions-of-googles-servers-with-a-single-package-nZWpDeY9p6g</loc>
<lastmod>2026-03-13T23:17:51.062Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/the-hackdac-story-learnings-from-organizing-the-worlds-largest-hardware-hacking-competition-IC-BB7HEor8</loc>
<lastmod>2026-03-13T23:19:49.251Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/the-overlooked-attack-surface-diving-into-windows-client-components-for-rce-vulnerabilities-sKNn5MtrcOM</loc>
<lastmod>2026-03-13T23:21:39.986Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/how-i-learned-to-stop-worrying-and-love-build-a-modern-detection-and-response-program-7kp5sxuzcoE</loc>
<lastmod>2026-03-14T06:25:56.726Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/threat-hunting-with-llm-from-discovering-apt-saaiwc-to-tracking-apts-with-ai-YfTAWUvznFo</loc>
<lastmod>2026-03-13T23:23:11.092Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/unveiling-mac-security-a-comprehensive-exploration-of-sandboxing-and-appdata-tcc-v1wIPaJT7x8</loc>
<lastmod>2026-03-13T23:25:03.770Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/unraveling-the-mind-behind-the-apt-analyzing-the-role-of-pretexting-in-cti-and-attribution-NmSlCsDWKoA</loc>
<lastmod>2026-03-13T23:26:56.058Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/uncovering-supply-chain-attack-with-code-genome-framework-CTbP6L3IuW4</loc>
<lastmod>2026-03-13T23:29:03.698Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/autospill-zero-effort-credential-stealing-from-mobile-password-managers-t-6YYdbjO7g</loc>
<lastmod>2026-03-14T06:28:28.126Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/tunnel-vision-exploring-vpn-post-exploitation-techniques-JIszPqQcZxw</loc>
<lastmod>2026-03-13T23:31:18.838Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/unoauthorized-abusing-oauth-20-client-credential-grant-flow-in-entra-id-GV1gyWTo7t4</loc>
<lastmod>2026-03-13T23:32:58.085Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/tracing-origins-navigating-content-authenticity-in-the-deepfake-era-zvDxZZ8IqTc</loc>
<lastmod>2026-03-13T23:34:49.762Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/tudoor-attack-systematically-exploring-and-exploiting-logic-vulnerabilities-in-dns-response-pre-processing-with-malformed-packets-z_LsXfP2nnI</loc>
<lastmod>2026-03-13T23:36:31.691Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/what-lies-beneath-the-surface-evaluating-llms-for-offensive-cyber-capabilities-p9T4gWds54o</loc>
<lastmod>2026-03-13T23:42:05.697Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/will-we-survive-the-transitive-vulnerability-locusts-DVlFHen9hh0</loc>
<lastmod>2026-03-13T23:43:55.543Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/how-hackers-changed-the-media-and-the-media-changed-hackers-a5O4OrYhqWo</loc>
<lastmod>2026-03-13T23:45:51.950Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/from-doxing-to-doorstep-exposing-privacy-intrusion-techniques-used-by-hackers-for-extortion-sg3CpRQdBek</loc>
<lastmod>2026-03-13T23:47:41.707Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/we-r-in-a-right-pickle-with-all-these-insecure-serialization-formats-yrM1ryBaIJs</loc>
<lastmod>2026-03-13T23:49:24.400Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/windows-downdate-downgrade-attacks-using-windows-updates-SI5_COohUlM</loc>
<lastmod>2026-03-13T23:51:00.181Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/modern-kill-chains-real-world-saas-attacks-and-mitigation-strategies-c5mOsjnbd6Y</loc>
<lastmod>2026-03-13T22:14:58.176Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/attacking-samsung-galaxy-a-boot-chain-and-beyond-qU9SzAo1G-s</loc>
<lastmod>2026-03-14T06:07:46.047Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/15-ways-to-break-your-copilot-KTyyeXWJFmk</loc>
<lastmod>2026-03-14T06:11:36.636Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/a-security-risc-the-state-of-microarchitectural-attacks-on-risc-v-HCZ6DCu2ciE</loc>
<lastmod>2026-03-14T06:14:07.797Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/rediscovering-headcrab-a-technical-analysis-of-a-novel-malware-and-the-mind-behind-it--Q_uAFb8_4E</loc>
<lastmod>2026-03-14T06:16:33.383Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/tsuking-coordinating-dns-resolvers-and-queries-into-potent-ddos-amplifiers-heLUFrwAHYQ</loc>
<lastmod>2026-03-14T06:19:16.111Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/millions-of-patient-records-at-risk-the-perils-of-legacy-protocols-CgJIxTP8ydQ</loc>
<lastmod>2026-03-14T06:21:03.328Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/security-through-transparency-scaling-your-customer-trust-program-AKB60fBiEHg</loc>
<lastmod>2026-03-14T06:24:07.098Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/orchestrate-this-kubernetes-rootkit-KHRs9de3qeQ</loc>
<lastmod>2026-03-14T06:30:13.870Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/hacking-your-documentation-who-should-wtfm-Wv1viTn_UeE</loc>
<lastmod>2026-03-14T06:31:33.050Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/reviving-jit-vulnerabilities-unleashing-the-power-of-maglev-compiler-bugs-on-chrome-browser-iSEhCw1x--c</loc>
<lastmod>2026-03-14T06:33:40.117Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/attacking-npus-of-multiple-platforms-GDiybPQn7g4</loc>
<lastmod>2026-03-14T06:35:37.247Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/hodor-reducing-attack-surface-on-nodejs-via-system-call-limitation-egjFm44AY80</loc>
<lastmod>2026-03-14T06:54:46.927Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/bypassing-tunnels-leaking-vpn-client-traffic-by-abusing-routing-tables-Gbt7aEANIEE</loc>
<lastmod>2026-03-14T06:37:21.897Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/logofail-security-implications-of-image-parsing-during-system-boot-ch0t2_yjQJQ</loc>
<lastmod>2026-03-14T06:39:25.449Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/evils-in-the-sparse-texture-memory-exploit-kernel-based-on-undefined-behaviors-of-graphic-apis-0IiSbJB-smk</loc>
<lastmod>2026-03-14T06:41:30.177Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/a-decade-after-stuxnet-how-siemens-s7-is-still-an-attackers-heaven-4-VoLm2SXao</loc>
<lastmod>2026-03-14T06:43:19.968Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/deleting-your-domain-preventing-data-leaks-at-tld-scale-S-vieCNshPQ</loc>
<lastmod>2026-03-14T06:45:03.205Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/breaking-theoretical-limits-the-gap-between-virtual-nics-and-physical-network-cards-bQYSQbvT4oY</loc>
<lastmod>2026-03-14T06:46:45.573Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/illegitimate-data-protection-requests-to-delete-or-to-address-_3wFwIeZb5g</loc>
<lastmod>2026-03-14T06:48:38.581Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/unmasking-apts-an-automated-approach-for-real-world-threat-attribution-mypauZPNCIY</loc>
<lastmod>2026-03-14T06:50:55.772Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/how-we-taught-chatgpt-4-to-break-mbed-tls-and-wolfssl-with-side-channel-attacks-BF7xmb7YLbc</loc>
<lastmod>2026-03-14T06:53:03.397Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/vobert-unstable-log-sequence-anomaly-detection-Hl1vHOTgpHc</loc>
<lastmod>2026-03-14T06:56:30.503Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/indirect-prompt-injection-into-llms-using-images-and-sounds-dqdOJzzWxs4</loc>
<lastmod>2026-03-14T06:58:44.144Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/hiding-in-the-clouds-abusing-azure-devops-services-to-bypass-microsoft-sentinel-analytic-rules-IYyfRu8Y0f4</loc>
<lastmod>2026-03-14T07:00:45.828Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/sweet-quadreams-or-nightmare-before-christmas-dissecting-an-ios-0-day-attack-7g3ti5AWEY0</loc>
<lastmod>2026-03-14T07:02:32.593Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/old-code-dies-hard-finding-new-vulnerabilities-in-old-third-party-software-components-iELfOvzbnAM</loc>
<lastmod>2026-03-14T07:05:05.680Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/breaching-the-perimeter-via-cloud-synchronized-browser-settings-D29OmUtyluk</loc>
<lastmod>2026-03-14T07:07:23.433Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/off-the-record-weaponizing-dhcp-dns-dynamic-updates-HvYg9HbKv88</loc>
<lastmod>2026-03-14T07:09:35.443Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/exploiting-asus-ddns-to-mitm-admin-credentials-OltCsagcbP4</loc>
<lastmod>2026-03-14T07:11:19.541Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/kidnapping-without-hostages-virtual-kidnapping-and-the-dark-road-ahead-PU-wBneh3sY</loc>
<lastmod>2026-03-14T07:12:57.284Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/when-the-front-door-becomes-a-backdoor-the-security-paradox-of-osdp-0yrHtJY3mww</loc>
<lastmod>2026-03-14T07:14:39.770Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/something-rotten-in-the-state-of-data-centers-PdOP1IchX6Y</loc>
<lastmod>2026-03-14T07:16:39.300Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/the-pool-party-you-will-never-forget-new-process-injection-techniques-using-windows-thread-pools-AvBO4f7blew</loc>
<lastmod>2026-03-14T07:18:18.518Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/through-the-looking-glass-how-open-source-projects-see-vulnerability-disclosure-FfMmQyIrmUE</loc>
<lastmod>2026-03-14T07:20:01.775Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/new-techniques-for-split-second-dns-rebinding-uVGdZ-i2JeI</loc>
<lastmod>2026-03-14T07:21:36.331Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/collidepower-the-evolution-of-software-based-power-side-channels-attacks-c2V9VfEDwEg</loc>
<lastmod>2026-03-14T07:23:28.542Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/a-world-view-of-ip-spoofing-in-l4-volumetric-ddos-attacks-e-Ec5M5cRpE</loc>
<lastmod>2026-03-14T07:25:35.835Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/post-quantum-crypto-the-hunt-V_yOHQO-8nI</loc>
<lastmod>2026-03-14T07:27:24.221Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/lessons-and-lulz-the-black-hat-europe-noc-report-jMguiXBOSjU</loc>
<lastmod>2026-03-14T07:31:50.566Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/industrialising-cyber-defence-in-an-asymmetric-world-d02zUEu7AYU</loc>
<lastmod>2026-03-14T07:33:41.785Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/the-world-of-cybersecurity-is-changing-laitlnhvNHk</loc>
<lastmod>2026-03-14T07:36:08.930Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/black-hat-europe-2023-review-board-panel-IiKobWTnGYQ</loc>
<lastmod>2026-03-14T07:38:35.933Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/black-hat-europe-2023-closing-panel-dxAn2DcB7cg</loc>
<lastmod>2026-03-14T07:40:34.578Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/chained-to-hit-discovering-new-vectors-to-gain-remote-and-root-access-in-sap-enterprise-software-xngNFBW0tu4</loc>
<lastmod>2026-03-14T07:42:39.964Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/zero-touch-pwn-abusing-zooms-zero-touch-provisioning-for-remote-attacks-on-desk-phones-KmrQYLncKhc</loc>
<lastmod>2026-03-14T07:44:17.851Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/oddfuzz-hunting-java-deserialization-gadget-chains-via-structure-aware-directed-greybox-fuzzing-az7s4Igk2nI</loc>
<lastmod>2026-03-14T07:46:09.631Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/reflections-on-trust-in-the-software-supply-chain-GXdHoxDgAYI</loc>
<lastmod>2026-03-14T07:47:59.275Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/ddos-for-hire-investigations-and-law-enforcement-operations-9YK7Ugx1MOs</loc>
<lastmod>2026-03-14T07:49:58.221Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/downfall-single-instruction-multiple-data-leaks-in-cutting-edge-cpus-JLHh_oViXl8</loc>
<lastmod>2026-03-14T07:54:28.276Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/exploiting-opc-ua-in-every-possible-way-practical-attacks-against-modern-opc-ua-architectures-Setiy_a1Ch0</loc>
<lastmod>2026-03-14T07:56:35.253Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/a-pain-in-the-nas-exploiting-cloud-connectivity-to-pwn-your-nas-8VK582uC55k</loc>
<lastmod>2026-03-14T07:58:25.916Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/creating-and-detecting-phishing-emails-using-large-language-models-yppjP4_4n40</loc>
<lastmod>2026-03-14T08:00:40.155Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/core-escalation-unleashing-the-power-of-cross-core-attack-on-heterogeneous-system-AMHNkfwjYok</loc>
<lastmod>2026-03-14T08:02:41.154Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/three-new-attacks-against-json-web-tokens-mJ6BQ5eFkG4</loc>
<lastmod>2026-03-14T08:04:37.993Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/code16-16-zero-day-vulnerabilities-in-codesys-BuYj7af7LVg</loc>
<lastmod>2026-03-14T08:06:48.923Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/the-hat-trick-exploit-chrome-twice-from-runtime-to-jit-TSHwVo2yBfg</loc>
<lastmod>2026-03-14T08:08:39.632Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/smashing-the-state-machine-the-true-potential-of-web-race-conditions-VzqG_-a8_Jo</loc>
<lastmod>2026-03-14T08:10:24.240Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/weaponizing-plain-text-ansi-escape-sequences-as-a-forensic-nightmare-opW_Q7jvSbc</loc>
<lastmod>2026-03-14T08:12:27.366Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/poisoning-web-scale-datasets-is-practical-la7_sgp0iKY</loc>
<lastmod>2026-03-14T08:38:34.402Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/shuffle-up-and-deal-attacking-automated-card-shufflers-QrwlzoU1bQw</loc>
<lastmod>2026-03-14T08:14:30.094Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/all-cops-are-broadcasting-breaking-tetra-after-decades-in-the-shadows-2FWrxfs3yFQ</loc>
<lastmod>2026-03-14T08:16:21.941Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/moustachedbouncer-aitm-powered-surveillance-via-belarus-isps-gi5MimlmT-E</loc>
<lastmod>2026-03-14T08:18:43.696Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/maginotdns-attacking-the-boundary-of-dns-caching-protection-5fnvYyO2NRk</loc>
<lastmod>2026-03-14T08:20:53.409Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/ai-assisted-decision-making-of-security-review-needs-wVSyqFdO-D8</loc>
<lastmod>2026-03-14T08:22:44.300Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/diving-into-windows-remote-access-service-for-pre-auth-bugs-GjPWCEEna3Q</loc>
<lastmod>2026-03-14T08:24:55.951Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/codeql-also-a-powerful-binary-analysis-engine-dv93pja1BzI</loc>
<lastmod>2026-03-14T08:26:53.417Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/oven-repair-the-hardware-hacking-way-ugHxUi_Ijso</loc>
<lastmod>2026-03-14T08:28:39.565Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/breaking-hardware-assisted-kernel-control-flow-integrity-with-page-oriented-programming-gOR4CZT37Xs</loc>
<lastmod>2026-03-14T08:30:42.553Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/video-based-cryptanalysis-extracting-cryptographic-keys-from-video-footage-of-a-devices-power-led-CzJQz7d3SrM</loc>
<lastmod>2026-03-14T08:32:39.833Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/lemons-and-liability-cyber-warranties-as-an-experiment-in-software-regulation-v6gQzI7eluc</loc>
<lastmod>2026-03-14T08:34:36.937Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/the-living-dead-hacking-mobile-face-recognition-sdks-with-non-deepfake-attacks-nPE2AjNB2sI</loc>
<lastmod>2026-03-14T08:36:25.623Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/second-breakfast-implicit-and-mutation-based-serialization-vulnerabilities-in-net-azI0gPWvbnQ</loc>
<lastmod>2026-03-14T08:40:19.581Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/evasive-maneuvers-trends-in-phishing-evasion-and-anti-evasion-IBjIwPqLfDI</loc>
<lastmod>2026-03-14T08:41:42.697Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/the-art-of-rooting-android-devices-by-gpu-mmu-features-2qkwSPnQqrU</loc>
<lastmod>2026-03-14T08:43:12.474Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/bad-iouring-a-new-era-of-rooting-for-android-fhx3W1z7YD0</loc>
<lastmod>2026-03-14T08:45:08.857Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/small-leaks-billions-of-dollars-practical-cryptographic-exploits-that-undermine-leading-crypto-wallets-y9zA5O52u8w</loc>
<lastmod>2026-03-14T08:46:42.077Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/bgp-implementation-vulnerabilities-and-fuzzing-6u27oAso9AQ</loc>
<lastmod>2026-03-14T08:49:37.077Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/civil-cyber-defense-use-your-resources-to-defend-nonprofits-as-they-combat-human-trafficking-and-subvert-authoritarian-regimes-wD1mHV6sd-g</loc>
<lastmod>2026-03-14T08:51:22.605Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/input-output-syslog-ios-obtaining-data-from-locked-ios-devices-via-live-monitoring-z4NIgH55EC0</loc>
<lastmod>2026-03-14T08:53:25.066Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/defender-pretender-when-windows-defender-updates-become-a-security-risk-3hYjdWNhhvk</loc>
<lastmod>2026-03-14T09:38:03.516Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/harry-parser-and-the-cursed-tracker-breaking-the-spell-of-online-data-collection-j7BOOEChZ2g</loc>
<lastmod>2026-03-14T08:55:26.907Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/apples-predicament-nspredicate-exploits-on-ios-and-macos-jZj8EEBp8xE</loc>
<lastmod>2026-03-14T08:57:24.022Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/physical-attacks-against-smartphones-kK4PC1WjlcY</loc>
<lastmod>2026-03-14T08:59:25.102Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/macing-sense-of-the-3cx-supply-chain-attack-T9dHKpdJO8I</loc>
<lastmod>2026-03-14T09:01:37.937Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/becoming-a-dark-knight-adversary-emulation-and-threat-intelligence-ulktZxdN6nA</loc>
<lastmod>2026-03-14T09:03:53.594Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/over-the-air-under-the-radar-attacking-and-securing-the-pixel-modem-KnN4NkaGCwE</loc>
<lastmod>2026-03-14T09:06:03.562Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/what-does-an-llm-powered-threat-intelligence-program-look-like-RepuHwg-JCA</loc>
<lastmod>2026-03-14T09:07:49.697Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/a-manufacturers-positive-approach-to-fend-off-iot-malware-wo55ZBjqQ8Y</loc>
<lastmod>2026-03-14T09:09:34.289Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/abusing-the-windows-mdm-stack-AT2Y8APvQVw</loc>
<lastmod>2026-03-14T09:11:30.271Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/kill-latest-mpu-based-protections-in-just-one-shot-targeting-all-commodity-rtoses-_JwxCXDIK-4</loc>
<lastmod>2026-03-14T09:39:43.570Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/cookie-crumbles-unveiling-web-session-integrity-vulnerabilities-F_wAzF4a7Xg</loc>
<lastmod>2026-03-14T09:13:26.441Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/nothing-but-net-leveraging-macos-networking-frameworks-to-heuristically-detect-malware-xIlJocMbfv8</loc>
<lastmod>2026-03-14T09:15:24.403Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/risks-from-ai-risk-management-zayOqE2e4OA</loc>
<lastmod>2026-03-14T09:17:18.338Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/edr-erase-data-remotely-9ZpDo7dWO4c</loc>
<lastmod>2026-03-14T09:27:11.224Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/shifting-the-balance-of-cybersecurity-risk-principles-and-approaches-for-security-by-design-and-default-_n7QRuR_Tck</loc>
<lastmod>2026-03-14T10:28:34.327Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/jailbreaking-an-electric-vehicle-in-2023-5tLNRk7mZXo</loc>
<lastmod>2026-03-14T09:28:50.950Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/all-you-need-is-guest-dmbRpwP5L9s</loc>
<lastmod>2026-03-14T09:30:41.754Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/low-level-rasp-protecting-applications-implemented-in-high-level-programming-languages-8B8k_VZ-Zj4</loc>
<lastmod>2026-03-14T09:32:18.122Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/me-and-my-evil-digital-twin-the-psychology-of-human-exploitation-by-ai-assistants-qjhfWWEQCgQ</loc>
<lastmod>2026-03-14T09:33:59.516Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/one-drive-double-agent-clouded-onedrive-turns-sides-O7y-b85HpSg</loc>
<lastmod>2026-03-14T09:36:07.407Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/evading-logging-in-the-cloud-bypassing-aws-cloudtrail-YP2XNAbB_Nw</loc>
<lastmod>2026-03-14T09:41:18.433Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/fast-ever-evolving-defenders-the-resilience-revolution-FyfNGGguvZg</loc>
<lastmod>2026-03-14T09:42:53.178Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/badge-of-shame-breaking-into-secure-facilities-with-osdp-irARV5X5VOM</loc>
<lastmod>2026-03-14T09:45:49.581Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/large-language-models-for-offensive-security-4o7qYHO0psI</loc>
<lastmod>2026-03-14T09:48:12.362Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/lifting-the-fog-of-war-monitoring-identifying-and-mitigating-ms-rpc-based-threats-iAsavoHcm2I</loc>
<lastmod>2026-03-14T09:50:19.458Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/video/dive-into-apple-userfs-SqAL8rYWgTY</loc>
<lastmod>2026-03-14T09:51:56.295Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/conference/dc-33-cryptoprivacy-village-talks_PL9fPq3eQfaaD4UX-4ccmt2JWBVyrqPxr_</loc>
<lastmod>2026-03-11T04:37:40.640Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/conference/dc33-hardware-hacking-village-talks_PL9fPq3eQfaaCqVCguEg0tgDJ-f239-V-Z</loc>
<lastmod>2026-03-11T04:38:31.068Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/conference/dc33-aerospace-village-talks_PL9fPq3eQfaaCYTaKum8bEwkPrKMNYObI_</loc>
<lastmod>2026-03-11T04:38:45.564Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/conference/dc33-packet-hacking-village-talks_PL9fPq3eQfaaCkEsFUFiTLNx-pIgDBDzfE</loc>
<lastmod>2026-03-10T16:56:03.162Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/conference/def-con-33-recon-village_PL9fPq3eQfaaACeEJdLLlJ69e2-QUuKviF</loc>
<lastmod>2026-03-11T04:21:37.583Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/conference/def-con-33-voting-village_PL9fPq3eQfaaCqGRw2XG5enW1hfuO-2MPS</loc>
<lastmod>2026-03-11T04:25:23.293Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/conference/def-con-33-blacks-in-cybersecurity-village_PL9fPq3eQfaaB-bROPaosfwOO6LsaJAwaX</loc>
<lastmod>2026-03-11T04:26:48.180Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/conference/def-con-33-rf-village_PL9fPq3eQfaaDLBf8tcriewe2fk2g2TltW</loc>
<lastmod>2026-03-11T04:27:43.490Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/conference/def-con-33-data-duplication-village_PL9fPq3eQfaaDeSx4Rsez-hkJXx_8etPvg</loc>
<lastmod>2026-03-11T04:28:32.392Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/conference/dc33-embedded-systems-village-talks_PL9fPq3eQfaaB_Eev4dUA_jI_pvzbgkHov</loc>
<lastmod>2026-03-11T04:28:41.021Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/conference/dc33-quantum-village_PL9fPq3eQfaaDX_xf6Jf1jjE6gJbE99Cr7</loc>
<lastmod>2026-03-11T04:31:39.024Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/conference/dc33-policy-village-talks_PL9fPq3eQfaaBOu1qphseWq4f2aqrsrhEd</loc>
<lastmod>2026-03-11T04:31:49.147Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/conference/dc33-mobile-village-talks_PL9fPq3eQfaaBFI2azznsajBBkrdEIzZrS</loc>
<lastmod>2026-03-11T04:32:21.570Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/conference/dc33-payment-village-talks_PL9fPq3eQfaaA1X_D4r7_j_etqYeqfNikI</loc>
<lastmod>2026-03-11T04:32:27.064Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/conference/dc33-physical-security-village_PL9fPq3eQfaaCjsw7hMqRHYucglZkITgcW</loc>
<lastmod>2026-03-11T04:32:50.215Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/conference/dc33-cryptocurrency-village-talks_PL9fPq3eQfaaAPNrfRyIhYAAB3DXOZ9ywF</loc>
<lastmod>2026-03-11T04:33:24.093Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/conference/dc33-adversary-village-talks_PL9fPq3eQfaaCFiv9n3Q28Q4DS6UUPo61z</loc>
<lastmod>2026-03-11T04:33:39.179Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/conference/dc33-bug-bounty-village-talks_PL9fPq3eQfaaBtm6ePthZjnhAqIwrgZYgu</loc>
<lastmod>2026-03-11T04:34:27.637Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/conference/dc33-car-hacking-village-talks_PL9fPq3eQfaaCDPzJmwuy0kwiuO4JOMqiY</loc>
<lastmod>2026-03-11T04:37:02.743Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/conference/dc33-biohacking-village-talks_PL9fPq3eQfaaCNiFkyqh3iXcsMW0Lr3Xs1</loc>
<lastmod>2026-03-11T04:39:03.614Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/conference/dc33-community-stage-talks_PL9fPq3eQfaaDG3PksHktZv322LkoTnkCz</loc>
<lastmod>2026-03-11T04:39:23.687Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/conference/def-con-33-hard-hat-brigade-talks_PL9fPq3eQfaaAqF3jC-2qlUCf-LKsGocP0</loc>
<lastmod>2026-03-11T04:40:41.012Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/conference/dc33-iot-village-talks_PL9fPq3eQfaaC-bZh19aVktTfBlLKP4Psm</loc>
<lastmod>2026-03-11T04:40:45.969Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/conference/dc33-maritime-hacking-village-talks_PL9fPq3eQfaaC8hg1o_x88Jjde4jeQxpbB</loc>
<lastmod>2026-03-11T04:41:26.502Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/conference/dc33-ics-village-talks_PL9fPq3eQfaaDCvgG5C07N0eubIhKqqbdp</loc>
<lastmod>2026-03-11T04:57:00.941Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/conference/def-con-33-main-stage-talks_PL9fPq3eQfaaBDgzddPpfJ0pJgQ2q0V47p</loc>
<lastmod>2026-03-11T05:14:10.162Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/conference/def-con-32_PL9fPq3eQfaaBmBnjhio8TNz00bBEINjER</loc>
<lastmod>2026-03-12T16:25:06.753Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/conference/black-hat-europe-2024_PLH15HpR5qRsXx69nei1C1BMC5MdvZm12I</loc>
<lastmod>2026-03-14T06:01:10.605Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/conference/sector-2025_PLH15HpR5qRsWETihf38P5vJCkM2s4iPoY</loc>
<lastmod>2026-03-13T04:32:27.868Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/conference/black-hat-europe-2025_PLH15HpR5qRsWwc5RANR9knvWpotKVXPWm</loc>
<lastmod>2026-03-13T05:05:37.870Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/conference/black-hat-usa-2025_PLH15HpR5qRsXtV3t9TlkRZBmIfcIC6THE</loc>
<lastmod>2026-03-13T05:08:12.116Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/conference/black-hat-asia-2024_PLH15HpR5qRsWJ70J405J7z1GUYPeCBpXy</loc>
<lastmod>2026-03-14T06:04:18.229Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/conference/black-hat-usa-2024_PLH15HpR5qRsUiLYPNSylDvlskvS_RSzee</loc>
<lastmod>2026-03-14T06:05:02.406Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/conference/black-hat-asia-2025_PLH15HpR5qRsWXApxW0vAsRduq9xa3ifCG</loc>
<lastmod>2026-03-13T14:11:47.243Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/conference/black-hat-asia-2023_PLH15HpR5qRsVYkxRzpOFrQTjNGXuYVpis</loc>
<lastmod>2026-03-14T13:01:56.031Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/conference/black-hat-europe-2023_PLH15HpR5qRsWPWBB9geQyXPXzbPu8cQ0p</loc>
<lastmod>2026-03-14T12:46:43.909Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/conference/bsidessf-2025_PLbZzXF2qC3RueNOgyuRfRtZmcb6GfLECE</loc>
<lastmod>2026-03-14T17:58:24.686Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/conference/black-hat-usa-2023_PLH15HpR5qRsWalnnt-9eYELxbEcYBPB6I</loc>
<lastmod>2026-03-14T13:00:52.186Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/conference/bsides-mumbai-2024-the-ultimate-cybersecurity-talks-and-discussions-playlist_PL0QrMQvRmXsSaGgEBBdDF6LoST0_ebXk1</loc>
<lastmod>2026-03-14T18:25:25.980Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/conference/bsides-london-2025-track-3_PLcrUMxzVpi6zMI0LQdhmNtAf42-HALflT</loc>
<lastmod>2026-03-14T18:47:38.370Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/conference/bsides-london-2025-track-2_PLcrUMxzVpi6xbQi1AT-W_e1TsQ1liaQng</loc>
<lastmod>2026-03-14T19:03:36.577Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/conference/bsides-london-2025-clappy-monkey-track_PLcrUMxzVpi6xog__kZkQTLfBiM6Jyw4Rb</loc>
<lastmod>2026-03-14T19:19:55.691Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/conference/bsides-london-2025-rookie-track-2_PLcrUMxzVpi6wWT9Sy2qsrX45BiDtFbjiu</loc>
<lastmod>2026-03-14T19:33:44.451Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/conference/bsides-london-2025-rookie-track-1_PLcrUMxzVpi6x8lWpIGgjNTEtKsuvUzUqR</loc>
<lastmod>2026-03-14T19:52:26.177Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/conference/bsidescache-2025_PLqVzh0_XpLfToLCefxK-u51hxGkAVpAQV</loc>
<lastmod>2026-03-15T05:21:02.717Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/conference/bsidesslc-2025_PLqVzh0_XpLfS_Sr8GkzLKXkJA-mmT62fR</loc>
<lastmod>2026-03-15T05:36:50.712Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/conference/bsides-slc-redrocks-2023_PLqVzh0_XpLfQYn9cJXch3il48c3i0znzg</loc>
<lastmod>2026-03-15T06:30:21.676Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/conference/bsidesslc-2023_PLqVzh0_XpLfQwD9O_WnyfgpmefJQVptpK</loc>
<lastmod>2026-03-15T06:44:14.647Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/conference/bsidesslc-2022_PLqVzh0_XpLfTjnJMk2BHgVAvsVmqovZPm</loc>
<lastmod>2026-03-15T07:37:11.489Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://open-luck.kuboid.in/conference/bsidesslc-2015_PLqVzh0_XpLfR9m_vKzZzsCjbn7st9PISR</loc>
<lastmod>2026-03-15T07:57:18.580Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
</urlset>
