<?xml version="1.0" encoding="UTF-8"?>
<!-- This sitemap was dynamically generated on 2026-05-12 at 17:01 by All in One SEO v4.9.6.2 - the original SEO plugin for WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://www.1bluebass.com/default-sitemap.xsl"?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>1bluebass</title>
		<link><![CDATA[https://www.1bluebass.com]]></link>
		<description><![CDATA[1bluebass]]></description>
		<lastBuildDate><![CDATA[Tue, 12 May 2026 18:39:47 +0000]]></lastBuildDate>
		<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
		<atom:link href="https://www.1bluebass.com/sitemap.rss" rel="self" type="application/rss+xml" />
		<ttl><![CDATA[60]]></ttl>

		<item>
			<guid><![CDATA[https://www.1bluebass.com/2022/01/22/280/]]></guid>
			<link><![CDATA[https://www.1bluebass.com/2022/01/22/280/]]></link>
			<title>Notes :: Getting around some Defenses</title>
			<pubDate><![CDATA[Tue, 12 May 2026 18:39:47 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.1bluebass.com/2022/09/20/welcome-to-the-site/]]></guid>
			<link><![CDATA[https://www.1bluebass.com/2022/09/20/welcome-to-the-site/]]></link>
			<title>Hello from the Bedroom Rocker!</title>
			<pubDate><![CDATA[Tue, 12 May 2026 18:39:40 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.1bluebass.com/2022/11/15/what-is-in-a-split-sheet/]]></guid>
			<link><![CDATA[https://www.1bluebass.com/2022/11/15/what-is-in-a-split-sheet/]]></link>
			<title>What is in a Split Sheet</title>
			<pubDate><![CDATA[Tue, 12 May 2026 18:39:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.1bluebass.com/2022/11/21/want-to-learn-linux/]]></guid>
			<link><![CDATA[https://www.1bluebass.com/2022/11/21/want-to-learn-linux/]]></link>
			<title>Want to Learn Linux</title>
			<pubDate><![CDATA[Tue, 12 May 2026 18:39:20 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.1bluebass.com/2024/10/31/new-video-assembly-primer-for-hackers-hello-world/]]></guid>
			<link><![CDATA[https://www.1bluebass.com/2024/10/31/new-video-assembly-primer-for-hackers-hello-world/]]></link>
			<title>New Video &#8211; Assembly Primer For Hackers &#8211; Hello World</title>
			<pubDate><![CDATA[Tue, 12 May 2026 18:21:04 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.1bluebass.com/2024/11/14/hacker-video-siegecast-kerberoasting-attacks-101/]]></guid>
			<link><![CDATA[https://www.1bluebass.com/2024/11/14/hacker-video-siegecast-kerberoasting-attacks-101/]]></link>
			<title>Hacker Video &#8211; SIEGECAST: Kerberoasting &#038; Attacks 101</title>
			<pubDate><![CDATA[Tue, 12 May 2026 18:21:04 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.1bluebass.com/2024/11/07/hacker-video-what-is-an-xxe-attack/]]></guid>
			<link><![CDATA[https://www.1bluebass.com/2024/11/07/hacker-video-what-is-an-xxe-attack/]]></link>
			<title>Hacker Video &#8211; What Is An XXE Attack</title>
			<pubDate><![CDATA[Tue, 12 May 2026 18:21:04 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.1bluebass.com/2024/11/21/hacker-video-fyodor-nmap-scanning-the-internet-defcon-16/]]></guid>
			<link><![CDATA[https://www.1bluebass.com/2024/11/21/hacker-video-fyodor-nmap-scanning-the-internet-defcon-16/]]></link>
			<title>Hacker Video &#8211; Fyodor &#8211; Nmap: Scanning The Internet &#8211; Defcon 16</title>
			<pubDate><![CDATA[Tue, 12 May 2026 18:21:04 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.1bluebass.com/2025/03/16/conference-video-offensive-countermeasures-still-trying-to-bring-sexy-back/]]></guid>
			<link><![CDATA[https://www.1bluebass.com/2025/03/16/conference-video-offensive-countermeasures-still-trying-to-bring-sexy-back/]]></link>
			<title>Conference Video &#8211; Offensive Countermeasures: Still trying to bring sexy back</title>
			<pubDate><![CDATA[Tue, 12 May 2026 18:20:39 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.1bluebass.com/2025/01/31/hacker-video-tactical-post-exploitation/]]></guid>
			<link><![CDATA[https://www.1bluebass.com/2025/01/31/hacker-video-tactical-post-exploitation/]]></link>
			<title>Hacker Video &#8211; Tactical Post Exploitation</title>
			<pubDate><![CDATA[Tue, 12 May 2026 18:20:39 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.1bluebass.com/2025/01/24/hacker-video-analyzing-meterpreter-with-redline/]]></guid>
			<link><![CDATA[https://www.1bluebass.com/2025/01/24/hacker-video-analyzing-meterpreter-with-redline/]]></link>
			<title>Hacker Video &#8211; Analyzing Meterpreter with Redline</title>
			<pubDate><![CDATA[Tue, 12 May 2026 18:20:39 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.1bluebass.com/2025/01/17/hacker-video-intro-to-hacking-web-apps/]]></guid>
			<link><![CDATA[https://www.1bluebass.com/2025/01/17/hacker-video-intro-to-hacking-web-apps/]]></link>
			<title>Hacker Video &#8211; Intro to Hacking Web Apps</title>
			<pubDate><![CDATA[Tue, 12 May 2026 18:20:39 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.1bluebass.com/2025/03/09/conference-video-dirty-secrets-they-didnt-teach-you-in-class/]]></guid>
			<link><![CDATA[https://www.1bluebass.com/2025/03/09/conference-video-dirty-secrets-they-didnt-teach-you-in-class/]]></link>
			<title>Conference Video &#8211;  Dirty Secrets They Didn&#8217;t Teach You In Class</title>
			<pubDate><![CDATA[Tue, 12 May 2026 18:20:39 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.1bluebass.com/2025/03/02/conference-video-fantastic-osint-and-where-to-find-it/]]></guid>
			<link><![CDATA[https://www.1bluebass.com/2025/03/02/conference-video-fantastic-osint-and-where-to-find-it/]]></link>
			<title>Conference Video &#8211; Fantastic OSINT and where to find it</title>
			<pubDate><![CDATA[Tue, 12 May 2026 18:20:39 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.1bluebass.com/2025/02/23/conference-video-osint-oh-the-places-youll-go/]]></guid>
			<link><![CDATA[https://www.1bluebass.com/2025/02/23/conference-video-osint-oh-the-places-youll-go/]]></link>
			<title>Conference Video &#8211; OSINT: Oh the places you&#8217;ll go</title>
			<pubDate><![CDATA[Tue, 12 May 2026 18:20:39 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.1bluebass.com/2025/02/16/conference-video-introductory-netflow-analysis/]]></guid>
			<link><![CDATA[https://www.1bluebass.com/2025/02/16/conference-video-introductory-netflow-analysis/]]></link>
			<title>Conference Video &#8211; Introductory Netflow Analysis</title>
			<pubDate><![CDATA[Tue, 12 May 2026 18:20:39 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.1bluebass.com/2025/02/21/hacker-video-theme-big-breaks/]]></guid>
			<link><![CDATA[https://www.1bluebass.com/2025/02/21/hacker-video-theme-big-breaks/]]></link>
			<title>Hacker Video &#8211; Theme: Big Breaks</title>
			<pubDate><![CDATA[Tue, 12 May 2026 18:20:39 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.1bluebass.com/2025/02/14/hacker-video-all-your-devices-can-be-hacked/]]></guid>
			<link><![CDATA[https://www.1bluebass.com/2025/02/14/hacker-video-all-your-devices-can-be-hacked/]]></link>
			<title>Hacker Video &#8211; All Your Devices Can Be Hacked</title>
			<pubDate><![CDATA[Tue, 12 May 2026 18:20:39 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.1bluebass.com/2025/02/07/hacker-video-exploiting-network-surveillance-cameras/]]></guid>
			<link><![CDATA[https://www.1bluebass.com/2025/02/07/hacker-video-exploiting-network-surveillance-cameras/]]></link>
			<title>Hacker Video &#8211; Exploiting Network Surveillance Cameras</title>
			<pubDate><![CDATA[Tue, 12 May 2026 18:20:39 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.1bluebass.com/2025/03/30/conference-video-win32-exploit-development-with-mona-and-the-msfframework/]]></guid>
			<link><![CDATA[https://www.1bluebass.com/2025/03/30/conference-video-win32-exploit-development-with-mona-and-the-msfframework/]]></link>
			<title>Conference Video &#8211; Win32 Exploit Development With Mona and the MSF Framework</title>
			<pubDate><![CDATA[Tue, 12 May 2026 18:20:38 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.1bluebass.com/2025/04/06/conference-video-invoke-obfuscation-powershell-obfusk8tion/]]></guid>
			<link><![CDATA[https://www.1bluebass.com/2025/04/06/conference-video-invoke-obfuscation-powershell-obfusk8tion/]]></link>
			<title>Conference Video &#8211; Invoke-Obfuscation: PowerShell obFUsk8tion</title>
			<pubDate><![CDATA[Tue, 12 May 2026 18:20:38 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.1bluebass.com/2025/04/18/malware-tv-automatically-extracting-obfuscated-strings-from-malware/]]></guid>
			<link><![CDATA[https://www.1bluebass.com/2025/04/18/malware-tv-automatically-extracting-obfuscated-strings-from-malware/]]></link>
			<title>Malware TV &#8211; Automatically Extracting Obfuscated Strings from Malware</title>
			<pubDate><![CDATA[Tue, 12 May 2026 18:20:38 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.1bluebass.com/2025/03/19/infosec-tv-decoupling-ci-from-cd-with-argocd/]]></guid>
			<link><![CDATA[https://www.1bluebass.com/2025/03/19/infosec-tv-decoupling-ci-from-cd-with-argocd/]]></link>
			<title>InfoSec TV &#8211; Decoupling CI from CD with ArgoCD</title>
			<pubDate><![CDATA[Tue, 12 May 2026 18:20:38 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.1bluebass.com/2025/04/27/conference-video-threat-hunting-within-organizations-andrew-case/]]></guid>
			<link><![CDATA[https://www.1bluebass.com/2025/04/27/conference-video-threat-hunting-within-organizations-andrew-case/]]></link>
			<title>Conference Video &#8211; Threat Hunting Within Organizations Andrew Case</title>
			<pubDate><![CDATA[Tue, 12 May 2026 18:19:29 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.1bluebass.com/2025/05/25/conference-video-a-deep-look-into-a-chinese-advanced-attack/]]></guid>
			<link><![CDATA[https://www.1bluebass.com/2025/05/25/conference-video-a-deep-look-into-a-chinese-advanced-attack/]]></link>
			<title>Conference Video &#8211; A deep look into a Chinese advanced attack</title>
			<pubDate><![CDATA[Tue, 12 May 2026 18:19:29 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.1bluebass.com/2025/05/18/conference-video-cyber-threat-intelligence-how-to-do-it-wrong/]]></guid>
			<link><![CDATA[https://www.1bluebass.com/2025/05/18/conference-video-cyber-threat-intelligence-how-to-do-it-wrong/]]></link>
			<title>Conference Video &#8211; Cyber Threat Intelligence How To Do It Wrong</title>
			<pubDate><![CDATA[Tue, 12 May 2026 18:19:29 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.1bluebass.com/2025/05/11/conference-video-why-we-are-not-building-a-defendable-internet/]]></guid>
			<link><![CDATA[https://www.1bluebass.com/2025/05/11/conference-video-why-we-are-not-building-a-defendable-internet/]]></link>
			<title>Conference Video &#8211; Why We are Not Building a Defendable Internet</title>
			<pubDate><![CDATA[Tue, 12 May 2026 18:19:29 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.1bluebass.com/2025/05/04/conference-video-former-cia-officer-will-teach-you-how-to-spot-a-lie/]]></guid>
			<link><![CDATA[https://www.1bluebass.com/2025/05/04/conference-video-former-cia-officer-will-teach-you-how-to-spot-a-lie/]]></link>
			<title>Conference Video &#8211; Former CIA Officer Will Teach You How to Spot a Lie</title>
			<pubDate><![CDATA[Tue, 12 May 2026 18:19:29 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.1bluebass.com/2025/05/10/kerberoasting-attacks-101/]]></guid>
			<link><![CDATA[https://www.1bluebass.com/2025/05/10/kerberoasting-attacks-101/]]></link>
			<title>Hacker TV &#8211; Kerberoasting &#038; Attacks 101</title>
			<pubDate><![CDATA[Tue, 12 May 2026 18:19:29 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.1bluebass.com/2025/05/23/hacker-tv-understanding-buffer-overflow-exploitation/]]></guid>
			<link><![CDATA[https://www.1bluebass.com/2025/05/23/hacker-tv-understanding-buffer-overflow-exploitation/]]></link>
			<title>hacker TV &#8211; Understanding buffer overflow exploitation</title>
			<pubDate><![CDATA[Tue, 12 May 2026 18:19:29 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.1bluebass.com/2025/05/03/malware-tv-reverse-engineering/]]></guid>
			<link><![CDATA[https://www.1bluebass.com/2025/05/03/malware-tv-reverse-engineering/]]></link>
			<title>Malware TV &#8211; Reverse Engineering</title>
			<pubDate><![CDATA[Tue, 12 May 2026 18:19:29 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.1bluebass.com/2025/04/20/conference-video-deep-web-what-to-do-and-what-not-to-do/]]></guid>
			<link><![CDATA[https://www.1bluebass.com/2025/04/20/conference-video-deep-web-what-to-do-and-what-not-to-do/]]></link>
			<title>Conference Video &#8211; Deep Web – what to do and what not to do</title>
			<pubDate><![CDATA[Tue, 12 May 2026 18:19:29 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.1bluebass.com/2025/05/09/hacking-ai-infrastructure-providers-for-fun/]]></guid>
			<link><![CDATA[https://www.1bluebass.com/2025/05/09/hacking-ai-infrastructure-providers-for-fun/]]></link>
			<title>Month of AI Video &#8211; Hacking AI Infrastructure Providers for Fun</title>
			<pubDate><![CDATA[Tue, 12 May 2026 18:19:29 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.1bluebass.com/2025/05/02/month-of-ai-video-practical-llm-security/]]></guid>
			<link><![CDATA[https://www.1bluebass.com/2025/05/02/month-of-ai-video-practical-llm-security/]]></link>
			<title>Month of AI Video &#8211; Practical LLM Security</title>
			<pubDate><![CDATA[Tue, 12 May 2026 18:19:29 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.1bluebass.com/2025/05/16/hacker-tv-hacker-course-buffer-overflow/]]></guid>
			<link><![CDATA[https://www.1bluebass.com/2025/05/16/hacker-tv-hacker-course-buffer-overflow/]]></link>
			<title>Hacker TV &#8211; Hacker Course Buffer Overflow</title>
			<pubDate><![CDATA[Tue, 12 May 2026 18:19:29 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.1bluebass.com/2025/05/30/garrick/]]></guid>
			<link><![CDATA[https://www.1bluebass.com/2025/05/30/garrick/]]></link>
			<title>LLM Vulnerability Scanning with Garrick</title>
			<pubDate><![CDATA[Tue, 12 May 2026 18:19:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.1bluebass.com/2025/06/01/conference-video-automating-malware-analysis-for-threat-intelligence/]]></guid>
			<link><![CDATA[https://www.1bluebass.com/2025/06/01/conference-video-automating-malware-analysis-for-threat-intelligence/]]></link>
			<title>Conference Video &#8211; Automating Malware Analysis for Threat Intelligence</title>
			<pubDate><![CDATA[Tue, 12 May 2026 18:19:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.1bluebass.com/2025/05/30/hacker-tv-start-web-app-pentesting/]]></guid>
			<link><![CDATA[https://www.1bluebass.com/2025/05/30/hacker-tv-start-web-app-pentesting/]]></link>
			<title>Hacker TV &#8211; Start Web App Pentesting</title>
			<pubDate><![CDATA[Tue, 12 May 2026 18:19:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.1bluebass.com/2025/07/12/hacker-tv-tradecraft-course/]]></guid>
			<link><![CDATA[https://www.1bluebass.com/2025/07/12/hacker-tv-tradecraft-course/]]></link>
			<title>Hacker TV &#8211; Tradecraft Course</title>
			<pubDate><![CDATA[Tue, 12 May 2026 18:18:47 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.1bluebass.com/2025/10/10/poison-pill-music-files/]]></guid>
			<link><![CDATA[https://www.1bluebass.com/2025/10/10/poison-pill-music-files/]]></link>
			<title>Poison-Pill Music Files</title>
			<pubDate><![CDATA[Tue, 12 May 2026 18:18:47 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.1bluebass.com/2025/06/15/conference-video-internet-scale-file-analysis/]]></guid>
			<link><![CDATA[https://www.1bluebass.com/2025/06/15/conference-video-internet-scale-file-analysis/]]></link>
			<title>Conference Video &#8211; Internet-Scale File Analysis</title>
			<pubDate><![CDATA[Tue, 12 May 2026 18:18:47 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.1bluebass.com/2025/08/22/security-leaks-for-sale/]]></guid>
			<link><![CDATA[https://www.1bluebass.com/2025/08/22/security-leaks-for-sale/]]></link>
			<title>Security leaks for sale</title>
			<pubDate><![CDATA[Tue, 12 May 2026 18:18:47 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.1bluebass.com/2025/06/20/all-your-devices-can-be-hacked/]]></guid>
			<link><![CDATA[https://www.1bluebass.com/2025/06/20/all-your-devices-can-be-hacked/]]></link>
			<title>Hacker TV &#8211; All Your Devices Can Be Hacked</title>
			<pubDate><![CDATA[Tue, 12 May 2026 18:18:47 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.1bluebass.com/2025/07/13/observability-in-the-age-of-llms/]]></guid>
			<link><![CDATA[https://www.1bluebass.com/2025/07/13/observability-in-the-age-of-llms/]]></link>
			<title>Conference Video &#8211; Observability in the Age of LLMs &#8211; Christine Yen</title>
			<pubDate><![CDATA[Tue, 12 May 2026 18:18:47 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.1bluebass.com/2025/06/14/assembly-primer/]]></guid>
			<link><![CDATA[https://www.1bluebass.com/2025/06/14/assembly-primer/]]></link>
			<title>Hacker TV &#8211; Assembly Primer For Hackers</title>
			<pubDate><![CDATA[Tue, 12 May 2026 18:18:47 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.1bluebass.com/2025/09/13/adventures-in-shellcode-obfuscation-part-1/]]></guid>
			<link><![CDATA[https://www.1bluebass.com/2025/09/13/adventures-in-shellcode-obfuscation-part-1/]]></link>
			<title>Adventures in Shellcode Obfuscation Part 1</title>
			<pubDate><![CDATA[Tue, 12 May 2026 18:18:47 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.1bluebass.com/2025/09/12/omni-model/]]></guid>
			<link><![CDATA[https://www.1bluebass.com/2025/09/12/omni-model/]]></link>
			<title>What is an omni model in AI</title>
			<pubDate><![CDATA[Tue, 12 May 2026 18:18:47 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.1bluebass.com/2025/07/20/fundamentals-distressingly-overlooked/]]></guid>
			<link><![CDATA[https://www.1bluebass.com/2025/07/20/fundamentals-distressingly-overlooked/]]></link>
			<title>Conference Video &#8211; Fundamentals &#8211; Distressingly Overlooked &#8211; David Elfering</title>
			<pubDate><![CDATA[Tue, 12 May 2026 18:18:47 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.1bluebass.com/2025/07/06/needle-in-a-haystack/]]></guid>
			<link><![CDATA[https://www.1bluebass.com/2025/07/06/needle-in-a-haystack/]]></link>
			<title>Conference Video &#8211; A Needle in a Haystack</title>
			<pubDate><![CDATA[Tue, 12 May 2026 18:18:47 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.1bluebass.com/2025/06/08/conference-video-how-i-learned-to-stop-worrying-and-love-the-blue-team/]]></guid>
			<link><![CDATA[https://www.1bluebass.com/2025/06/08/conference-video-how-i-learned-to-stop-worrying-and-love-the-blue-team/]]></link>
			<title>Conference Video &#8211; How I Learned To Stop Worrying and Love the Blue Team</title>
			<pubDate><![CDATA[Tue, 12 May 2026 18:18:47 +0000]]></pubDate>
		</item>
				</channel>
</rss>
