<?xml version="1.0" encoding="utf-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xmlns:video="http://www.google.com/schemas/sitemap-video/1.1"><url><loc>http://www.exploresecurity.com/</loc><priority>1.0</priority></url><url><loc>http://www.exploresecurity.com/2013/04/</loc><priority>1.0</priority></url><url><loc>http://www.exploresecurity.com/2013/08/</loc><priority>1.0</priority></url><url><loc>http://www.exploresecurity.com/about/</loc><priority>1.0</priority></url><url><loc>http://www.exploresecurity.com/author/Jerome/</loc><priority>1.0</priority></url><url><loc>http://www.exploresecurity.com/category/passwords/</loc><priority>1.0</priority></url><url><loc>http://www.exploresecurity.com/category/penetration-testing/</loc><priority>1.0</priority></url><url><loc>http://www.exploresecurity.com/category/tools/</loc><priority>1.0</priority></url><url><loc>http://www.exploresecurity.com/category/web-applications/</loc><priority>1.0</priority></url><url><loc>http://www.exploresecurity.com/category/wireless/</loc><priority>1.0</priority></url><url><loc>http://www.exploresecurity.com/defence-in-depth-penetration-testing/</loc><priority>1.0</priority></url><url><loc>http://www.exploresecurity.com/how-to-improve-password-storage-security-right-now/</loc><priority>1.0</priority></url><url><loc>http://www.exploresecurity.com/sophie-a-web-sql-shell/</loc><image:image><image:loc>http://www.exploresecurity.com/wp-content/uploads/2013/04/sophie3.png</image:loc></image:image><image:image><image:loc>http://www.exploresecurity.com/wp-content/uploads/2013/04/sophie1.png</image:loc></image:image><image:image><image:loc>http://www.exploresecurity.com/wp-content/uploads/2013/04/sophie2.png</image:loc></image:image><image:image><image:loc>http://www.exploresecurity.com/wp-content/uploads/2013/04/sophie0.png</image:loc></image:image><priority>1.0</priority></url><url><loc>http://www.exploresecurity.com/sophie-a-web-sql-shell/?replytocom=53</loc><priority>1.0</priority></url><url><loc>http://www.exploresecurity.com/tag/aircrack/</loc><priority>1.0</priority></url><url><loc>http://www.exploresecurity.com/tag/database/</loc><priority>1.0</priority></url><url><loc>http://www.exploresecurity.com/tag/defence-in-depth/</loc><priority>1.0</priority></url><url><loc>http://www.exploresecurity.com/tag/hashing/</loc><priority>1.0</priority></url><url><loc>http://www.exploresecurity.com/tag/password-security/</loc><priority>1.0</priority></url><url><loc>http://www.exploresecurity.com/tag/password-storage/</loc><priority>1.0</priority></url><url><loc>http://www.exploresecurity.com/tag/passwords/</loc><priority>1.0</priority></url><url><loc>http://www.exploresecurity.com/tag/penetration-testing-2/</loc><priority>1.0</priority></url><url><loc>http://www.exploresecurity.com/tag/pentesting/</loc><priority>1.0</priority></url><url><loc>http://www.exploresecurity.com/tag/shell/</loc><priority>1.0</priority></url><url><loc>http://www.exploresecurity.com/tag/sql/</loc><priority>1.0</priority></url><url><loc>http://www.exploresecurity.com/tag/tool/</loc><priority>1.0</priority></url><url><loc>http://www.exploresecurity.com/tag/wireless-2/</loc><priority>1.0</priority></url><url><loc>http://www.exploresecurity.com/tag/wpa/</loc><priority>1.0</priority></url><url><loc>http://www.exploresecurity.com/tag/wpa2/</loc><image:image><image:loc>http://www.exploresecurity.com/wp-content/uploads/2013/04/header2.png</image:loc></image:image><priority>1.0</priority></url><url><loc>http://www.exploresecurity.com/william-wpawpa2-4-way-handshake-extraction-script/</loc><image:image><image:loc>http://www.exploresecurity.com/wp-content/uploads/2013/04/ss2.png</image:loc></image:image><image:image><image:loc>http://www.exploresecurity.com/wp-content/uploads/2013/04/ss1.png</image:loc></image:image><image:image><image:loc>http://www.exploresecurity.com/wp-content/uploads/2013/04/ss6.png</image:loc></image:image><image:image><image:loc>http://www.exploresecurity.com/wp-content/plugins/si-captcha-for-wordpress/captcha/images/refresh.png</image:loc></image:image><image:image><image:loc>http://www.exploresecurity.com/wp-content/uploads/2013/04/ss4.png</image:loc></image:image><image:image><image:loc>http://www.exploresecurity.com/wp-content/uploads/2013/04/ss3.png</image:loc></image:image><image:image><image:loc>http://www.exploresecurity.com/wp-content/uploads/2013/04/ss5.png</image:loc></image:image><priority>1.0</priority></url><url><loc>http://www.exploresecurity.com/wp-content/plugins/si-captcha-for-wordpress/captcha/images/refresh.png</loc><priority>1.0</priority></url><url><loc>http://www.exploresecurity.com/wp-content/uploads/2013/04/header2.png</loc><priority>1.0</priority></url><url><loc>http://www.exploresecurity.com/wp-content/uploads/2013/04/sophie0.png</loc><priority>1.0</priority></url><url><loc>http://www.exploresecurity.com/wp-content/uploads/2013/04/sophie1.png</loc><priority>1.0</priority></url><url><loc>http://www.exploresecurity.com/wp-content/uploads/2013/04/sophie2.png</loc><priority>1.0</priority></url><url><loc>http://www.exploresecurity.com/wp-content/uploads/2013/04/sophie3.png</loc><priority>1.0</priority></url><url><loc>http://www.exploresecurity.com/wp-content/uploads/2013/04/ss1.png</loc><priority>1.0</priority></url><url><loc>http://www.exploresecurity.com/wp-content/uploads/2013/04/ss2.png</loc><priority>1.0</priority></url><url><loc>http://www.exploresecurity.com/wp-content/uploads/2013/04/ss3.png</loc><priority>1.0</priority></url><url><loc>http://www.exploresecurity.com/wp-content/uploads/2013/04/ss4.png</loc><priority>1.0</priority></url><url><loc>http://www.exploresecurity.com/wp-content/uploads/2013/04/ss5.png</loc><priority>1.0</priority></url><url><loc>http://www.exploresecurity.com/wp-content/uploads/2013/04/ss6.png</loc><priority>1.0</priority></url></urlset>