<?xml version="1.0" encoding="UTF-8"?>
<urlset
	xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
	xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
	xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9
		http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd">
	<url>
		<loc>https://www.kahusecurity.com</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/about.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tools.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/tools_update_12-2021.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/tools_update_vs_latest_maldocs.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/another_way_to_analyze_xlm_macros.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/emotet_stats.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/reversing_a_self-contained_phishing_page.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/excel_vba_loads_dll_into_itself.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/introducing_psunveil.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/cmd_watcher_updated_to_v0.3.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/deobfuscating_dosfuscated_scripts.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/cmd_watcher_updated.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/cmd_watcher_and_maldocs.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/reneo_updated.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/deobfuscating_the_powershell_stego_script.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/introducing_reneo.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/deobfuscating_the_latest_maldocs.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/reflow_javascript_backdoor.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/deobfuscating_a_sophisticated_mailer.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/older.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tools/APIDumper_v0.1.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tools/BinaryFileConverter_v0.1.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tools/Converter_v0.14.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tools/ConverterNET_v0.1.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tools/CoverFire_v0.1.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tools/DataConverter_v0.10.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tools/DifferenceCalculator_v0.1.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tools/FileConverter_v0.7.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tools/JSDeobfuscator_v0.3.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tools/JSPacker_v0.1.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tools/PHPConverter_v0.3.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tools/PHPScriptDecoder_v0.1.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tools/Pinpoint_v0.2.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tools/RegistryDumper_v0.2.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tools/Reneo_v0.4.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tools/Revelo_v0.6.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tools/SandboxTester.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tools/Scout_v0.2.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tools/ScriptDecoder_v0.1.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tools/ScriptDeobfuscator_v0.2.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tools/SecretDecoderRing.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tools/Sounder_v0.2.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tools/spidermonkey-1.8.5.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tools/TextDecoderToolkit_v0.2.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tools/URLRevealer_v0.2.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tools/WelcomeMat_v0.1.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tools/Word2Dec_v0.1.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tools/ZeuSENCDecrypter.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/deobfuscating_phpjiami.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/converter_net_v0.1_released.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/not_your_typical_ransomware_infection.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/wild_wild_west_05-2017.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/static_vs_dynamic_analysis_and_the_amusing_outcome.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/wild_wild_west_11-2016.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/deobfuscating_the_nemucod_downloader_script.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/deobfuscating_a_malicious_php_downloader.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/javascript_leads_to_browser_hijacking.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/tools_update_09-2016.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/locky_js_and_url_revealer.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/script_deobfuscator_updated.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/deobfuscating_a_hideous-looking_js_downloader.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/script_deobfuscator_released.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/packing_unpacking_javascript_from_dos.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/another_javascript_deobfuscator_update.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/text_decoder_toolkit.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/deobfuscating_magento_guruincsite_javascript.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/javascript_deobfuscator_updated.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/new_javascript_deobfuscator_tool.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/cyber_exercise_tools.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/webshell_with_a_booby_trap.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/another_converter_update.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/malicious_word_macro_caught_using_sneaky_trick.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/deobfuscating_a_wicked-looking_script.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/another_revelo_update.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/wild_wild_west_12-2014.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/registry_dumper_find_and_dump_hidden_registry_keys.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/securing_keepass_with_a_second_factor.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/drupal_7_sql_injection_info.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/tools_update_10-2014.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/javascript_deobfuscation_tools_redux.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/detecting_phishing_sites_in_your_logs.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/a_quick_peek_at_network_injection.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/wild_wild_west_07-2014.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/reversing_a_php_script_dynamically_and_statically.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/deobfuscating_php_scripts.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/reversing_rig_eks_flash_file.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/rig_exploit_pack.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/8x8_script_leads_to_infinity_drive-by.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/wild_wild_west_04-2014.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/vbe_script_leads_to_bank_fraud.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/scout_new_tool_released.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/converter_update_02-2014.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/exploring_xor_decryption_methods.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/pinpointing_malicious_redirects.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/revelo_updated.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/box_php_fraud_kit.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/sneaky_redirect_to_exploit_kit.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/exploit_delivery_networks.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/the_resurrection_of_redkit.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/pinpoint_tool_released.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/analyzing_dotkachef_exploit_pack.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/wild_wild_west_12-2013.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/deobfuscating_magnitude_exploit_kit.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/converter_v010_released.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/php_infector.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/deobfuscating_the_ck_exploit_kit.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/chinese_exploit_pack_updated.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/wild_wild_west_08-2013.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/tools_update_07-2013.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/kore_exploit_kit.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/jjencode_script_leads_to_drive-by.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/if_computers_were_cars.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/deobfuscating_javascript_with_revelo.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/converter_v08_released.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/digging_deeper_into_redkit.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/wild_wild_west_04-2013.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/dissecting_a_malicious_word_document.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/quick_java_applet_analysis.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/converter_v07_released.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/converter_v06_released.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/another_clever_drive-by.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/clever_redirect_to_impact_ek.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/wild_wild_west_02-2013.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/unpacking_a_malicious_java_applet.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/converter_update_01-2013.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/wild_wild_west_12-2012.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/new_exploit_pack_spotted.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/exploit_packs_and_the_secret_decoder_ring.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/kaixin_exploit_and_tool_update.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/not_a_very_nice_pack.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/wild_wild_west_10-2012.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/security_tools_new_and_updated.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/crimeboss_exploit_pack.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/neosploit_get_java_0day.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/java_0day_using_latest_dadongs_js_obfuscator.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/analyzing_a_new_exploit_pack.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/new_chinese_exploit_pack.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/windows_registry_downloader.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/spearphish_leads_to_cridex.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/playing_hide_and_seek_with_malicious_scripts.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/js_obfuscation_using_useragent_string.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/revelo_v04_released.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/wild_wild_west_06-2012.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/revelo_v03_released.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/revelo_v02_released.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/revelo_javascript_deobfuscator.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/binary_file_converter.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/escalating_java_exploitation.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/converter_v03_released.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/chinese_pack_using_dadongs_jsxx_vip_script.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/another_chinese_pack.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/wild_wild_west_02-2012.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/techno_xpack.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/hierarchy_exploit_pack.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/chinese_exploit_packs.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/converter_update_12-2011.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/another_new_exploit_pack.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/custom_base64_decoder.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/pdf_analysis_using_pdfstreamdumper.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/cve-2011-2140_caught_in_the_wild.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/interesting_boa_phish.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/apec_spearphish.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/two_drive-bys_one_site.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/neosploit_is_back.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/elaborate_black_hole_infection.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/malware_infection_from_new_exploit_pack.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/wild_wild_west_10-2011.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/deobfuscating_breakingpoints_js_challenge.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/brilliant_javascript_obfuscation_technique.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/unknown_exploit_pack_gets_updated.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/wild_wild_west_09-2011.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/converter_update_08-2011.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/a_tricky_obfuscated_javascript.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/hacking_magazine_hacked.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/drive-by_cache_payload_hunting.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/christmas_pack_in_july.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/wild_wild_west_07-2011.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/javascript_deobfuscation_tools_part_2.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/javascript_deobfuscation_tools_part_1.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/best_pack.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/sava_exploits_pack.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/deobfuscate_javascript_using_ms_tools.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/black_hole_malvertisement_campaign.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/reversing_the_incognito_exploit_kit.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/wild_wild_west_06-2011.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/hidden_malicious_redirector.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/deobfuscating_the_facebook_spam_script.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/meta_sploit_pack.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/new_exploit_kit_egypack.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/flash_used_in_idol_malvertisement.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/amusing_ups_fedex_malicious_email.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/wild_wild_west_05-2011.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/new_unknown_exploit_kit.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/malscript_on_compromised_site.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/impressive_javascript_encoder.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/ups_scam_email_links_to_black_hole.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/flash_0day_found_in_drive-by.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/wild_wild_west_04-2011.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/yes_exploit_kit_upgraded.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/bleedinglife_malvertisement_campaign.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/cyber_security_tips.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/robopak_exploit_kit.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/javascript_obfuscation_using_colors.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/zeus_source_code_for_sale.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/a_new_unknown_exploit_kit.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/incognito_exploit_kit_redux.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/incognito_exploit_kit.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/using_ie_as_a_malware_downloader.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/making_wacky_redirect_scripts_part_iii.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/making_wacky_redirect_scripts_part_ii.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/making_wacky_redirect_scripts_part_i.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/siberia_exploit_kit.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/java_exploit_construction_kit.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/new_exploit_kits.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/spidermonkey_185_for_windows.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/deobfuscating_tricks.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/malicious_javascript_analysis_ii.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/malvertisement_leads_to_dragon_pack.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/bypassing_xss_filters.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/malicious_javascript_analysis.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/new_russian_exploit_kit.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/bleeding_life_exploit_pack.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/zeus_alive_and_well.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/saved_by_a_single_character.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/an_interesting_malicious_script.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2011/cve-2011-2140-caught-in-the-wild.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2010.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2010/11.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2010/11/page/2.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2010/12.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2010/12/malvertisement-leads-to-dragon-pack.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2010/an-interesting-malicious-script.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2010/bleeding-life-exploit-pack.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2010/bypassing-xss-filters.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2010/deobfuscating-tricks.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2010/malicious-javascript-analysis.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2010/malicious-javascript-analysis-ii.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2010/malvertisement-leads-to-dragon-pack.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2010/new-russian-exploit-kit.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2010/spidermonkey-1-8-5-for-windows.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2010/zeus-alive-and-well.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2011.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2011/01.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2011/01/page/2.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2011/02.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2011/03.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2011/04.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2011/04/page/2.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2011/05.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2011/05/deobfuscating-the-facebook-spam-script.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2011/05/page/2.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2011/06.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2011/06/best-pack.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2011/06/javascript-deobfucation-tools-part-2.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2011/06/javascript-deobfuscation-tools-part-1.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2011/06/page/2.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2011/07.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2011/08.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2011/08/hacking-magazine-hacked.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2011/09.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2011/09/brilliant-javascript-obfuscation-technique.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2011/09/deobfuscating-breakingpoints-js-challenge.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2011/10.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2011/11.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2011/11/custom-base64-decoder.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2011/11/pdf-analysis-using-pdfstreamdumper.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2011/12.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2011/a-tricky-obfuscated-javascript.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2011/amusing-upsfedex-malicious-email.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2011/apec-spearphish-2.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2011/best-pack.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2011/black-hole-malvertisement-campaign.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2011/bleedinglife-malvertisement-campaign.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2011/brilliant-javascript-obfuscation-technique.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2011/christmas-pack-in-july.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2011/converter-tool-released.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2011/converter-tool-updated.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2011/custom-base64-decoder.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2011/cyber-security-tips.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2011/deobfuscate-javascript-using-ms-tools.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2011/deobfuscating-breakingpoints-js-challenge.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2011/deobfuscating-the-facebook-spam-script.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2011/drive-by-cache-payload-hunting.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2011/elaborate-black-hole-infection.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2011/flash-0day-found-in-drive-by.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2011/flash-used-in-idol-malvertisement.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2011/hacking-magazine-hacked.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2011/hidden-malicious-redirector.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2011/impressive-javascript-encoder.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2011/incognito-exploit-kit.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2011/incognito-exploit-kit-redux.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2011/interesting-boa-phish.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2011/java-exploit-construction-kit.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2011/javascript-deobfucation-tools-part-2.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2011/javascript-deobfuscation-tools-part-1.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2011/javascript-obfuscation-using-colors.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2011/making-wacky-redirect-scripts-part-i.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2011/making-wacky-redirect-scripts-part-ii.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2011/making-wacky-redirect-scripts-part-iii.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2011/malscript-on-compromised-site.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2011/malware-infection-from-new-exploit-pack.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2011/metasploit-pack.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2011/neosploit-is-back.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2011/new-exploit-kit-egypack.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2011/new-exploit-kits.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2011/new-exploit-pack.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2011/new-unknown-exploit-kit.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2011/new-unknown-exploit-kit-2.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2011/pdf-analysis-using-pdfstreamdumper.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2011/reversing-the-incognito-exploit-kit.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2011/robopak-exploit-kit.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2011/sava-exploits-pack.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2011/siberia-exploit-kit.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2011/two-drive-bys-one-site.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2011/unknown-exploit-pack-gets-updated.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2011/ups-scam-email-links-to-black-hole.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2011/using-ie-as-a-malware-downloader.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2011/wild-wild-west.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2011/wild-wild-west-–-072011.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2011/wild-wild-west-–-082011.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2011/wild-wild-west-–-092011.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2011/wild-wild-west-–-102011.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2011/wild-wild-west-062011.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2011/wild-wild-west-update.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2011/yes-exploit-kit-upgraded.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2011/zeus-source-code-for-sale.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2012.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2012/01.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2012/02.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2012/03.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2012/03/converter-v0-3-released.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2012/03/escalating-java-attacks.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2012/04.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2012/04/binary-file-converter.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2012/05.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2012/05/revelo-javascript-deobfuscator.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2012/06.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2012/07.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2012/07/windows-registry-downloader.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2012/08.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2012/08/analyzing-a-new-exploit-pack.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2012/08/new-chinese-exploit-pack.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2012/09.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2012/09/crimeboss-exploit-pack.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2012/10.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2012/11.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2012/12.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2012/analyzing-a-new-exploit-pack.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2012/another-chinese-pack.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2012/binary-file-converter.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2012/chinese-exploit-packs.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2012/chinese-pack-using-dadongs-jsxx-vip-script.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2012/converter-v0-3-released.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2012/crimeboss-exploit-pack.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2012/escalating-java-attacks.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2012/exploit-packs-and-the-secret-decoder-ring.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2012/hierarchy-exploit-pack.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2012/java-0-day-using-latest-dadongs-js-obfuscator.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2012/js-obfuscation-using-useragent-string.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2012/kaixin-exploit-and-tool-update.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2012/neosploit-gets-java-0-day.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2012/new-chinese-exploit-pack.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2012/new-exploit-pack-spotted.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2012/not-a-very-nice-pack.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2012/playing-hide-and-seek-with-malicious-scripts.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2012/revelo-javascript-deobfuscator.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2012/revelo-update.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2012/revelo-v0-3-released.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2012/revelo-v0-4.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2012/security-tools-new-and-updated.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2012/spear-phish-leads-to-cridex.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2012/techno-xpack.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2012/wild-wild-west-022012.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2012/wild-wild-west-062012.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2012/wild-wild-west-102012.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2012/wild-wild-west-122012.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2012/windows-registry-downloader.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2013.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2013/01.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2013/02.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2013/02/clever-redirect-to-impact-ek.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2013/03.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2013/03/converter-v0-7-released.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2013/04.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2013/04/dissecting-a-malicious-word-document.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2013/05.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2013/05/digging-deeper-into-redkit.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2013/06.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2013/06/converter-v0-8-released.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2013/06/deobfuscating-javascript-with-revelo.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2013/06/if-computers-were-cars.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2013/07.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2013/07/jjencode-script-leads-to-drive-by.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2013/07/kore-exploit-kit.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2013/07/tools-update.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2013/08.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2013/08/wild-wild-west-082013.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2013/09.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2013/10.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2013/11.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2013/12.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2013/12/analyzing-dotkachef-exploit-pack.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2013/analyzing-dotkachef-exploit-pack.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2013/another-clever-drive-by.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2013/chinese-exploit-pack-updated.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2013/clever-redirect-to-impact-ek.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2013/converted-v0-10-released.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2013/converter-update.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2013/converter-update/2013-01-02_01.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2013/converter-update/2013-01-02_02.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2013/converter-update/2013-01-02_05.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2013/converter-update/2013-01-02_06.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2013/converter-update/2013-01-02_08.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2013/converter-update/2013-01-02_09.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2013/converter-update/2013-01-02_10.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2013/converter-v0-6-released.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2013/converter-v0-7-released.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2013/converter-v0-8-released.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2013/deobfuscating-javascript-with-revelo.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2013/deobfuscating-magnitude-exploit-kit.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2013/deobfuscating-the-ck-exploit-kit.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2013/digging-deeper-into-redkit.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2013/dissecting-a-malicious-word-document.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2013/if-computers-were-cars.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2013/jjencode-script-leads-to-drive-by.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2013/kore-exploit-kit.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2013/php-infector.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2013/quick-java-applet-analysis.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2013/tools-update.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2013/unpacking-a-malicious-java-applet.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2013/unpacking-a-malicious-java-applet/2013-01-14_01.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2013/unpacking-a-malicious-java-applet/2013-01-14_02.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2013/unpacking-a-malicious-java-applet/2013-01-14_03.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2013/unpacking-a-malicious-java-applet/2013-01-14_04.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2013/unpacking-a-malicious-java-applet/2013-01-14_05.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2013/unpacking-a-malicious-java-applet/2013-01-14_06.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2013/unpacking-a-malicious-java-applet/2013-01-14_07.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2013/unpacking-a-malicious-java-applet/2013-01-14_08.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2013/unpacking-a-malicious-java-applet/2013-01-14_09.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2013/unpacking-a-malicious-java-applet/2013-01-14_10.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2013/unpacking-a-malicious-java-applet/2013-01-14_11.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2013/wild-wild-west-022013.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2013/wild-wild-west-042013.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2013/wild-wild-west-082013.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2013/wild-wild-west-122013.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2014.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2014/01.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2014/01/pinpoint-tool-released.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2014/01/the-resurrection-of-redkit.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2014/02.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2014/02/converter-updated.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2014/02/exploring-xor-decryption-methods.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2014/02/pinpointing-malicious-redirects.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2014/03.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2014/04.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2014/05.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2014/05/rig-exploit-pack.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2014/06.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2014/06/deobfuscating-php-scripts.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2014/07.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2014/07/reversing-a-php-script-dynamically-and-statically.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2014/08.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2014/09.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2014/09/detecting-phishing-sites-in-your-logs.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2014/09/javascript-deobfuscation-tools-redux.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2014/10.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2014/10/tools-update-2.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2014/11.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2014/11/securing-keepass-with-a-second-factor.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2014/12.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2014/12/registry-dumper-find-and-dump-hidden-registry-keys.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2014/12/wild-wild-west-122014.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2014/8x8-script-leads-to-infinity-drive-by.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2014/a-quick-peek-at-network-injection.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2014/box-php-fraud-kit.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2014/converter-updated.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2014/deobfuscating-php-scripts.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2014/detecting-phishing-sites-in-your-logs.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2014/drupal-7-sql-injection-info.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2014/exploit-delivery-networks.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2014/exploring-xor-decryption-methods.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2014/javascript-deobfuscation-tools-redux.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2014/pinpoint-tool-released.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2014/pinpointing-malicious-redirects.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2014/registry-dumper-find-and-dump-hidden-registry-keys.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2014/revelo-updated.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2014/reversing-a-php-script-dynamically-and-statically.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2014/reversing-rig-eks-flash-file.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2014/rig-exploit-pack.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2014/scout-new-tool-released.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2014/securing-keepass-with-a-second-factor.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2014/sneaky-redirect-to-exploit-kit.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2014/the-resurrection-of-redkit.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2014/tools-update-2.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2014/vbe-script-leads-to-bank-fraud.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2014/wild-wild-west-042014.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2014/wild-wild-west-072014.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2014/wild-wild-west-122014.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2015.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2015/02.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2015/03.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2015/03/malicious-word-macro-caught-using-sneaky-trick.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2015/06.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2015/06/converted-updated.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2015/07.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2015/10.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2015/10/cyber-exercise-tools.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2015/10/javascript-deobfuscator-updated.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2015/10/new-javascript-deobfuscator-tool.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2015/11.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2015/11/text-decoder-toolkit.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2015/converted-updated.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2015/cyber-exercise-tools.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2015/deobfuscating-a-wicked-looking-script.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2015/deobfuscating-magento-guruincsite-javascript.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2015/javascript-deobfuscator-updated.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2015/malicious-word-macro-caught-using-sneaky-trick.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2015/new-javascript-deobfuscator-tool.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2015/revelo-updated-2.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2015/text-decoder-toolkit.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2015/webshell-with-booby-trap.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2016.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2016/01.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2016/01/javascript-deobfuscator-updated-2.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2016/02.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2016/02/packingunpacking-javascript-from-dos.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2016/02/script-deobfuscator-released.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2016/06.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2016/06/locky-js-and-url-revealer.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2016/09.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2016/09/tools-update-3.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2016/10.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2016/10/javascript-leads-to-browser-hijacking.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2016/11.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2016/deobfuscating-a-hideous-looking-js-downloader.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2016/deobfuscating-a-malicious-php-downloader.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2016/deobfuscating-the-nemucod-downloader-script.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2016/javascript-deobfuscator-updated-2.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2016/javascript-leads-to-browser-hijacking.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2016/locky-js-and-url-revealer.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2016/packingunpacking-javascript-from-dos.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2016/script-deobfuscator-released.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2016/script-deobfuscator-updated.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2016/tools-update-3.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2016/wild-wild-west-112016.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2017.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2017/02.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2017/05.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2017/06.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2017/06/converternet-v0-1-released.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2017/10.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2017/10/deobfuscating-phpjiami.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2017/converternet-v0-1-released.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2017/deobfuscating-phpjiami.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2017/not-your-typical-ransomware-infection.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2017/static-vs-dynamic-analysis-and-the-amusing-outcome.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2017/wild-wild-west-052017.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2018.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2018/02.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2018/02/deobfuscating-a-sophisticated-mailer.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2018/03.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2018/03/reflow-javascript-backdoor.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2018/04.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2018/04/deobfuscating-the-latest-maldocs.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2018/05.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2018/05/a-quick-look-into-the-oracle-weblogic-attacks.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2018/06.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2018/06/introducing-reneo.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2018/deobfuscating-a-sophisticated-mailer.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2018/reflow-javascript-backdoor.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/attachment_id-13704.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/attachment_id-13705.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/attachment_id-13706.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/attachment_id-13707.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/attachment_id-13708.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/attachment_id-13709.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/attachment_id-13710.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/attachment_id-13711.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/attachment_id-13712.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/attachment_id-13713.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/attachment_id-13714.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/attachment_id-13715.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/attachment_id-13716.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/attachment_id-13717.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/attachment_id-13718.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/attachment_id-13719.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/attachment_id-13720.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/attachment_id-13721.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/attachment_id-13722.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/attachment_id-13723.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/attachment_id-13724.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/attachment_id-13725.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/attachment_id-13726.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/attachment_id-13727.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/attachment_id-13728.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/attachment_id-13729.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/attachment_id-13730.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/attachment_id-13731.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/attachment_id-13732.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/attachment_id-13749.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/attachment_id-13750.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/attachment_id-13751.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/attachment_id-13752.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/attachment_id-13753.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/attachment_id-13754.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/attachment_id-13755.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/attachment_id-13756.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/attachment_id-13757.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/attachment_id-13758.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/attachment_id-13759.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/attachment_id-13760.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/cat-1.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/cat-10.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/cat-14.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/cat-19.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/cat-284.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/cat-4.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/cat-46.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/cat-57.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/cat-66.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/cat-98.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/m-201011.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/m-201012.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/m-201101.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/m-201102.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/m-201103.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/m-201104.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/m-201105.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/m-201106.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/m-201107.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/m-201108.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/m-201109.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/m-201110.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/m-201111.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/m-201112.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/m-201201.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/m-201202.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/m-201203.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/m-201204.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/m-201205.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/m-201206.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/m-201207.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/m-201208.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/m-201209.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/m-201210.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/m-201211.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/m-201212.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/m-201301.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/m-201302.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/m-201303.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/m-201304.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/m-201305.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/m-201306.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/m-201307.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/m-201308.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/m-201309.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/m-201310.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/m-201311.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/m-201312.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/m-201401.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/m-201402.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/m-201403.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/m-201404.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/m-201405.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/m-201406.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/m-201407.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/m-201408.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/m-201409.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/m-201410.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/m-201411.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/m-201412.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/m-201502.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/m-201503.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/m-201506.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/m-201507.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/m-201510.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/m-201511.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/m-201601.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/m-201602.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/m-201606.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/m-201609.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/m-201610.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/m-201611.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/m-201702.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/m-201705.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/m-201706.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/m-201710.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/m-201802.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/m-201803.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/m-201804.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/p-12559.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/p-12585.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/p-12603.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/p-12659.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/p-12679.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/p-12724.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/p-12923.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/p-12938.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/p-12973.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/p-13017.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/p-13241.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/p-13278.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/p-13482.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/p-13521.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/p-13540.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/p-13654.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/p-13672.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/p-13687.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/p-13700.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/p-13733.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/page_id-13485.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/page_id-2.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/page_id-4.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/paged-2.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/wptouch_switch-desktop-redirect-/2010/zeus-alive-and-well.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/s-Wild-Wild-West.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag-deobfuscation.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag-emotet.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag-hancitor.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag-macros.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag-maldocs.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag-office.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag-trickbot.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag-vba.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag-word.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/author/darryl.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/author/darryl/page/2.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/author/darryl/page/3.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/author/sectek.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/author/sectek/page/2.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/author/vince.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/category/0-day.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/category/awareness.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/category/crimeware.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/category/exploit-packs.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/category/exploit-packs/page/2.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/category/exploit-packs/page/3.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/category/javascript-2.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/category/javascript-2/page/2.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/category/malicious-email.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/category/malicious-email/page/2.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/category/malware.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/category/pentest.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/category/tools.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/category/tools/page/2.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/category/tools/page/3.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/category/xss.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/downloads.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/kahu.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/latest.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/page/10.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/page/11.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/page/12.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/page/2.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/page/20.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/page/24.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/page/3.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/page/4.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/page/9.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/posts/another_way_to_analyze_xlm_macros_ref-sneakymonkey_net.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/0day.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/1-8-5.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/8x8.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/actionscript.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/adobe.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/american-idol.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/anti-phishing.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/apec.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/backdoor.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/backdoors.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/banking-trojan.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/best-pack.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/bestpack.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/binary.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/black-hole.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/blackhole.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/bleeding-life.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/bleedinglife.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/bomba.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/breaking-point.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/breakingpoint-contest.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/browser-hijacking.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/chepack.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/chinese-exploit-pack.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/cipher.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/ck-vip-exploit.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/contest.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/conversion.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/converter.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/converter/page/2.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/converternet.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/cool-exploit.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/corba.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/cridex.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/crimeboss.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/critxpack.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/curl.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/custom-base64.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/cve-2010-0806.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/cve-2011-0611.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/cve-2011-2110.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/cve-2011-2140.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/cve-2011-3544.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/cve-2012-0158.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/cve-2012-0506.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/cve-2012-4681.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/cve-2014-3704.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/cybercrime.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/cybersecurity.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/dadong.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/dadong-jsxx-vip.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/data-converter.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/dataconverter.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/dean-edwards.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/death-touch.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/debugger.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/decimal.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/decoder.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/deobfuscation.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/deobfuscation/page/2.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/deobfuscation/page/3.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/deobfuscator.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/developer-tools.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/difference-calculator.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/dotcache.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/dotcachef.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/dotkachef.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/downloader.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/dragon-pack.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/drive-by.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/drive-by-cache.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/drive-by-download.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/drive-by/page/2.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/drupal.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/egypack.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/eleonore.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/email.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/enc.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/encoder.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/engine.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/entropy.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/exploit.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/exploit-delivery-network.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/exploit-kit.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/exploit-kit/page/2.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/exploit-kits.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/exploit-pack.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/facebook.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/fedex.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/fiesta.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/file-converter.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/fileconverter.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/firefox.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/firewall.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/flash.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/flash-exploit.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/flash/page/2.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/flimkit.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/fraud.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/gameover.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/gong-da.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/goon.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/goon-ek.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/guerillapack.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/hakin9-magazine.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/hex.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/hhtxnet-com.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/hierarchy-exploit-pack.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/hivelogic.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/humor.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/ie-automation.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/ie8.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/iepeers.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/impact.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/impact-exploit.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/incognito.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/infinity.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/inject.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/intercept.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/internet-explorer.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/invoice.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/jagermonkey.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/java.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/java-0-day.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/java-applet.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/java-deobfuscation.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/java-exploit.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/java/page/2.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/javacript.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/javascript.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/javascript-compressor.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/javascript-deobfuscation.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/javascript-deobfuscation/page/2.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/javascript-downloader.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/javascript-obfuscation.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/javascript-obfuscation/page/2.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/javascript-packer.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/javascript/page/2.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/javascript/page/3.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/javascript/page/4.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/javascript/page/5.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/jjencode.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/joomla.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/jscript.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/jsdeobfuscator.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/jsdetox.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/jsunpack.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/kaixin.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/keechallenge.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/keepass.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/kein-exploit-pack.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/kore.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/locky.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/log-analysis.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/logos.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/lololo.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/lznt1.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/macro.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/magento.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/magnitude.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/mailpoet.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/malicious.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/malicious-javascript.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/malicious/page/2.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/malvertisement.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/malware.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/malzilla.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/merry-christmas-pack.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/metapack.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/metasploit.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/microsoft.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/microsoft-script-encoder.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/microsoft-word.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/mozilla.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/ms10-087.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/neosploit.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/netboom.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/network-injection.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/neutrino.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/nice-pack.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/nsa.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/nuclear.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/obfuscated.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/obfuscated-javascript.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/obfuscated-javascript/page/2.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/obfuscated-php.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/obfuscation.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/obfuscation/page/2.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/odin.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/officemalscanner.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/open-source-exploit-pack.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/password-manager.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/pay0c.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/payload-hunting.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/pdf.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/pdfstreamdumper.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/pek.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/pentest-2.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/phantomjs.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/phish.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/phishing-detection.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/phoenix-exploit.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/php.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/php-obfuscation.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/php-script.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/php-scripts.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/phpconverter.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/phpjiami.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/pinpoint.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/poc.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/poster.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/poweliks.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/proxy.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/ramayama.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/ransomware.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/rdp.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/red-kit.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/redirects.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/redkit.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/regdumper.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/regedit.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/registry.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/registry-downloader.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/registry-dumper.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/revelo.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/revelo/page/2.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/revelo/page/3.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/reverse.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/rhino.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/rig.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/robopak.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/rogueware.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/rtf.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/russian.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/satire.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/sava.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/savage.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/sclog.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/scout.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/script-debugger.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/script-deobfuscator.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/script-editor.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/search-redirector.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/security-awareness.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/security-bypass.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/seo-sploit.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/shellcode.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/siberia.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/sibhost.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/smb.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/social-engineering.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/sounder.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/source-code.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/spam.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/spear-phish.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/spearphish.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/spider.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/spidermonkey.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/spyeye.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/sundown.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/sweet-orange.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/tamperproof.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/techno-xpack.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/text.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/text-decoder.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/tipsheet.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/tools.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/tostring.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/two-factor.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/ups.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/urlrevealer.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/vba.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/vbs.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/vbs-powershell.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/vm.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/vpn.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/webshells.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/website-compromise.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/wget.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/windows.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/wmi.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/word-document.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/word-exploit.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/wordpress.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/wscript.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/wsf.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/xor.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/xss-2.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/yes-exploit-system.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/yubikey.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/zeus.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/zhi-zhu.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tools-2.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/uploads/spidermonkey-1-8-5.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2016-01-09_01.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2016-01-09_02.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2016-01-09_03.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2016-01-09_04.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2016-01-09_05.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2016-01-09_06.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2016-01-09_07.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2016-01-09_08.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2016-01-09_09.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2016-02-06_01.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2016-02-15_01.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2016-02-15_02.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2016-02-15_03.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2016-02-15_04.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2016-02-15_05.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2016-02-15_06.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2016-02-15_07.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2016-02-15_08.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2016-02-15_09.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2016-02-15_10.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2016-02-15_11.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2016-02-15_12.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2016-02-15_13.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2016-02-15_14.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2016-02-15_15.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2016-02-15_16.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2016-02-15_17.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2016-02-15_18.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2016-02-15_19.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2016-06-22_01.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2016-06-22_02.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2016-06-22_03.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2016-06-22_04.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2016-06-22_05.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2016-06-22_06.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2016-09-30_01.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2016-09-30_02.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2016-09-30_03.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2016-09-30_04.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2016-10-08_01.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2016-10-08_02.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2016-10-08_03.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2016-10-08_04.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2016-10-08_05.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2016-10-08_06.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2016-10-08_07.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2016-10-08_08.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2016-10-08_09.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2016-10-08_10.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2016-10-08_11.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2016-10-08_12.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2016-10-08_13.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2016-10-08_14.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2016-02-21_01.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2016-02-21_02.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2016-02-21_03.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2016-02-21_04.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2016-02-21_05.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2016-02-21_06.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2016-02-21_07.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2016-02-21_08.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2016-10-15_01.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2016-10-15_02.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2016-10-15_03.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2016-10-15_04.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2016-10-15_05.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2016-10-15_06.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2016-10-15_07.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2016-10-15_08.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2016-10-15_09.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2016-10-15_10.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2016-10-15_11.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2016-10-15_12.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2016-10-22_01.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2016-10-22_02.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2016-10-22_03.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2016-10-22_04.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2016-10-22_05.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2016-10-22_06.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2016-10-22_07.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2016-10-22_08.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2016-10-22_09.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2016-10-22_10.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2016-10-22_11.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2016-10-22_12.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2016-10-22_13.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2016-10-22_14.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2016-10-22_15.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2016-10-22_16.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2016-10-22_17.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2016-10-22_18.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2016-10-22_19.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2016-10-22_20.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2016-10-22_21.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2016-10-22_22.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2016-10-22_23.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2016-10-22_24.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2016-10-22_25.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2016-10-22_26.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2016-02-22_01.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2016-02-22_02.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2016-02-22_03.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/wildwildwest_1116.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2017-06-24_01.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2017-06-24_02.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2017-06-24_03.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2017-10-31_01.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2017-10-31_03.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2017-10-31_04.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2017-10-31_05.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2017-10-31_06.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2017-10-31_07.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2017-10-31_08.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2017-10-31_09.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2017-10-31_10.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2017-10-31_11.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2017-10-31_12.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2017-10-31_13.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2017-10-31_14.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2017-10-31_15.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2017-05-25_01.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2017-05-25_02.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2017-05-25_03.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2017-05-25_04.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2017-05-25_05.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2017-05-25_06.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2017-05-25_07.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2017-05-25_08.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2017-05-25_09.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2017-02-27_01.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2017-02-27_02.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2017-02-27_03.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2017-02-27_04.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2017-02-27_05.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2017-02-27_06.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2017-02-27_07.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2017-02-27_08.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2017-02-27_09.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2017-02-27_10.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2017-02-27_11.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2017-02-27_12.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2017-02-27_13.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2017-02-27_14.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2017-02-27_15.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2017-02-27_16.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2017-02-27_17.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2017-02-27_18.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/2017-02-27_19.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/wildwildwest_0517.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/reneo.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/reverse-engineering.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/tag/tool.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/author-2.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/p-50.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/p-80.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/p-327.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/p-1147.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/p-1643.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/p-3292.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/p-7609.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/p-12037.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/p-12335.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/p-12343.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/p-12382.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/p-12420.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/p-12474.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/p-12485.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/p-12531.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/p-12626.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/p-12688.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/p-12706.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/p-12759.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/p-12842.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/p-12868.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/p-12880.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/p-12909.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/p-13089.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/p-13112.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/p-13126.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/p-13309.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/p-13329.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/p-13368.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/p-13395.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/p-13470.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/p-13527.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/p-13547.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/p-13607.html</loc>
	</url>
	<url>
		<loc>https://www.kahusecurity.com/p-13629.html</loc>
	</url>
</urlset>