<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xmlns:xhtml="http://www.w3.org/1999/xhtml">
  <url>
    <loc>https://www.countershell.com/blogarchive</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-01-17</lastmod>
  </url>
  <url>
    <loc>https://www.countershell.com/blogarchive/shellgym-reversing-for-exploitation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-09-28</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/678003668d2f217beb553773/4cb3a7bf-e3f1-4a1d-bccf-dcb1465129aa/sg-sept-1-createfileW.PNG</image:loc>
      <image:title>Blog - ShellGym: Reversing for Exploitation - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/678003668d2f217beb553773/fa99849a-56fc-4e3f-b597-3f720d290a17/sg-sept-2-ba+on+createfile.PNG</image:loc>
      <image:title>Blog - ShellGym: Reversing for Exploitation - Make it stand out</image:title>
      <image:caption>Note: The windbg command is done in a one-liner to create this image, instead of having many “g”s to advance the program. There’s no need for such a command beyond some automation.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/678003668d2f217beb553773/e7ef333b-32ca-4083-ba90-273ae7843577/sg-sept-3-editing+rcx.PNG</image:loc>
      <image:title>Blog - ShellGym: Reversing for Exploitation - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/678003668d2f217beb553773/c953d11b-789b-4de5-9a4a-5c7fc5f6aca4/sg-sept-4-result.PNG</image:loc>
      <image:title>Blog - ShellGym: Reversing for Exploitation - Make it stand out</image:title>
      <image:caption>Note how the unencrypted rar has the path traversal indicators in the file, whereas the encrypted version doesn’t</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.countershell.com/blogarchive/two-courses-one-dev-approach</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-08-15</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/678003668d2f217beb553773/2f89d4ff-9272-47d7-99fe-d908508c869c/lab+concept.PNG</image:loc>
      <image:title>Blog - Two courses, one common development approach - Make it stand out</image:title>
      <image:caption>It’s easy and fun to come up with diagrams, and possibly just as fun trying to develop a technical POC of the solution. But it’s important not to lose sight of the question that we’re trying to answer.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.countershell.com/blogarchive/shellgym-javascript-fun-and-games</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-08-07</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/678003668d2f217beb553773/5057328e-4576-493c-a858-19e4bc756d7e/untrusted1.PNG</image:loc>
      <image:title>Blog - ShellGym: Javascript fun and games - Make it stand out</image:title>
      <image:caption>The layout of the game is represented by the JS code on the right. You can only add code in the black segment, so by rights, the red segments cannot be modified or tampered with. Or can it? Looking through the game code and performing some debugging shows how the game tries to parse the user generated code, inserting some markers to denote the start and end of the level.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/678003668d2f217beb553773/046c9a4a-f072-4a89-a60c-71d19a31a673/untrusted2.PNG</image:loc>
      <image:title>Blog - ShellGym: Javascript fun and games - Make it stand out</image:title>
      <image:caption>The result of executing the code. The entire level has been bypassed and replaced with our own constructed level. We can apply this “hack” to almost all the other levels in the game to escape the imposed constraints.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/678003668d2f217beb553773/8dd6cad7-acbd-4dcc-a296-5252c271587f/shellgym26jul.PNG</image:loc>
      <image:title>Blog - ShellGym: Javascript fun and games - Make it stand out</image:title>
      <image:caption>ShellGym in session!</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.countershell.com/blogarchive/on-vibecoding</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-07-28</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/678003668d2f217beb553773/0a334447-d99a-4cc5-924d-6f15c567b59e/greyhats.PNG</image:loc>
      <image:title>Blog - On vibecoding - Make it stand out</image:title>
      <image:caption>You’re in a town, but actually you’re in a Powershell jail…</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/678003668d2f217beb553773/96b029d3-8bfa-4587-9dd5-f02c2d7e39bb/AI_nope2.PNG</image:loc>
      <image:title>Blog - On vibecoding - Make it stand out</image:title>
      <image:caption>Who remembers all the wevtutil stuff anyway. But in any case, this is not correct, though, it’s quite close. To be fair, most people won’t use wevtutil. Instead, if you are ok with running PowerShell, prompting for a PowerShell one-liner is a better approach:</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/678003668d2f217beb553773/2e7c8e78-b543-4f8d-b96f-f041950cf1be/AI_yup1.PNG</image:loc>
      <image:title>Blog - On vibecoding - Make it stand out</image:title>
      <image:caption>This is correct, and I’d just add a “| Format-List” at the end, or some similar way to display output.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.countershell.com/blogarchive/shellshock-workshop-at-sincon-2025</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-07-20</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/678003668d2f217beb553773/1eb57e57-f4cf-44d4-86f2-5301f55cf3fe/SHELLSHOCK%40SINCON2025.jpg</image:loc>
      <image:title>Blog - SHELLSHOCK @ SINCON 2025 - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/678003668d2f217beb553773/c631fd04-6aa5-46c9-ba3c-99253066af54/SHELLSHOCK-SINCON-LEARNING-POINTS.png</image:loc>
      <image:title>Blog - SHELLSHOCK @ SINCON 2025 - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/678003668d2f217beb553773/f6ecf2a8-eec8-4474-89a8-d314448893fc/SHELLSHOCK-SINCON-UPCOMING.png</image:loc>
      <image:title>Blog - SHELLSHOCK @ SINCON 2025 - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.countershell.com/blogarchive/cybersecuritybycountershell</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-27</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/678003668d2f217beb553773/982a96ea-00a3-41e6-af5d-d173f0ff923e/gear-icon-asdc-blog.png</image:loc>
      <image:title>Blog - Cybersecurity by counterShell - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/678003668d2f217beb553773/7ba83498-b4e5-420c-9a0b-f3f188a1b167/return-to-basics-icon-asdc-blog.png</image:loc>
      <image:title>Blog - Cybersecurity by counterShell - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/678003668d2f217beb553773/a54afe59-c6d7-44ae-b599-6fd30606813e/asdc-upcoming-icon.png</image:loc>
      <image:title>Blog - Cybersecurity by counterShell - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.countershell.com/blogarchive/saic-post-course-review-part2</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-07-20</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/678003668d2f217beb553773/3aa63fa2-de57-4ba2-aa08-9ddc959a5fd3/cs-blog-test-1.png</image:loc>
      <image:title>Blog - SAIC Post-Course Review 2</image:title>
      <image:caption>The Security Analyst Introductory Course concluded its 3rd run on 11th April 2025, after two successful runs in March (link to blog post 1). We designed this course to cater to non-cybersecurity practitioners, and the initial feedback we got was that the course was too short and a little too advanced. This time round, we included some pre-reading material, which helped to provide a baseline for participants. While we observed that the pre-reading material had some impact, most of the feedback points were echoed in the third run, highlighting the need for a little more time on technical content. Indeed, the course does cover quite a wide range, and it takes time to absorb the scenario content. In any case, here is some of the feedback:</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/678003668d2f217beb553773/f5503c42-640d-4b40-8180-2f3d08aa3970/CS-BLOG-TEST-2.png</image:loc>
      <image:title>Blog - SAIC Post-Course Review 2</image:title>
      <image:caption>Experience with KK I totally enjoyed the course. KK was an excellent instructor, so much to learn from him that can be applicable to our work, either immediately or in future. More importantly, thought he demystified and sparked alot of love and appreciation for a field of work that seemed esoteric initially. Highly recommended! Experience with the Course Hands on practical portions were interesting as it gave a first hand experience into what red teams are doing, which analysts may never get a chance to see or do. Ease of the Course The course syllabus is relevant to my work as I have a non-technical background. In particular, the segments on understanding network, terminology and considerations for actions are useful for collaboration work with technical colleagues.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/678003668d2f217beb553773/ec9d8bea-9b44-4ca5-aa61-f237893982de/cs-blog-test-3.png</image:loc>
      <image:title>Blog - SAIC Post-Course Review 2</image:title>
      <image:caption>With the tweaks counterShell has made, we think we've found a good balance of difficulty in the course. However, the technical components perhaps need further time and emphasis, in order for participants to grasp key basic technical concepts and apply them. Hence, we will adjust the course content accordingly to cater for this need before we launch future runs of the course.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/678003668d2f217beb553773/ef2f3cf9-a019-44d1-a45f-327252f5a67a/cs-blog-test-4.png</image:loc>
      <image:title>Blog - SAIC Post-Course Review 2</image:title>
      <image:caption>The security assessment of the simulated environment continues to be the highlight of the course, and we will continue to include such material in all the courses we develop. As a whole, we believe that people learn best when there are problems to solve, and such simulated environments are intended to provide training value and an avenue to exercise some level of creativity in the problem solving approach. Separately, we've noticed that the course's technical content has "sparked joy" in some participants, and we'd like to continue to grow that spark into something more substantial. We will figure out how best to do that. :)</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/678003668d2f217beb553773/351a100d-9835-498d-b8ca-bebca46c23fc/high-rest-cs-blog-test-5.png</image:loc>
      <image:title>Blog - SAIC Post-Course Review 2 - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.countershell.com/blogarchive/blog-saic-aar-part-1</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-07-20</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/678003668d2f217beb553773/4f48dee0-f1e8-4f32-81ff-569540a3c145/blog+saic.png</image:loc>
      <image:title>Blog - SAIC Post-Course Review 1 - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/678003668d2f217beb553773/95e2b445-3b42-4293-9343-4bcd8831eb0b/blog+saic+tree.png</image:loc>
      <image:title>Blog - SAIC Post-Course Review 1 - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.countershell.com/sparring-and-consultation-sessions</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-03-17</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/678003668d2f217beb553773/1736442750762-K85DWQAAZEVH3YCDQMAR/arrow-test-4.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/678003668d2f217beb553773/be80e0f5-1ae4-48bb-9155-c489f2896d3b/_1A.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/678003668d2f217beb553773/84287713-fde5-4ef9-924d-2eeb6d8e329f/_3A.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/678003668d2f217beb553773/7c8f7de2-e1f7-44ff-aeba-959fd402a05c/_2C.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.countershell.com/about</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-08-07</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/678003668d2f217beb553773/0d400a48-fc81-4a63-b04d-769d139ebb4f/%5B01%5D-THE-BIG-PICTURE.png</image:loc>
      <image:title>About</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/678003668d2f217beb553773/170a281c-6ddb-46aa-a0f1-d06658dba2fa/%5B03%5D-PRACTITIONERS.png</image:loc>
      <image:title>About</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/678003668d2f217beb553773/92349966-82f9-49d8-9a72-15af7feb799f/%5B04%5D-BEYOND-TRAINING.png</image:loc>
      <image:title>About</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/678003668d2f217beb553773/905b9f56-3c31-476b-9143-5a2e08a600b4/02.png</image:loc>
      <image:title>About</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/678003668d2f217beb553773/1736442729244-VD91BJ69ZY7AU9H6GZMU/SUPPORTING-GRAPHIC-2.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/678003668d2f217beb553773/1736442729278-NSYYQ3QHFDNYN81C8J10/SUPPORTING-GRAPHIC-2.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.countershell.com/adversary-simulation-detection-counteraction</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-03-17</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/678003668d2f217beb553773/1736442732006-TQAZ4CAVK38F89O4BZVJ/KK-COURSE-ICON-1.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/678003668d2f217beb553773/1736442732013-2Q0VSUUURBI9XH1ENVW0/KK-COURSE-ICON-2.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/678003668d2f217beb553773/1736442732017-14MBFM33H5F4XGQOLLAY/KK-COURSE-ICON-3.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.countershell.com/courses</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-08-15</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/678003668d2f217beb553773/1736442750770-S77J7A6G4XE3R6QH1MSF/KK-COURSE-ICON-4.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/678003668d2f217beb553773/1736442750775-PYMU9CNNGSK0QOFBZPVJ/KK-COURSE-ICON-5.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/678003668d2f217beb553773/1736442750780-VO5KJBTQC4JLMTQ4QIMV/KK-COURSE-ICON-6.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/678003668d2f217beb553773/1736442739043-H7ZGDKKJTAVHL1I4EDBO/KK-COURSE-ICON-2.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.countershell.com/forensics-reverse-engineering-exploitation</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-03-17</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/678003668d2f217beb553773/63c7d2de-ea5c-4bfd-b19b-ced5920f691f/FREE-1.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/678003668d2f217beb553773/d25af1fc-8b28-4117-bee0-fb4610c03bbb/FREE-2.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/678003668d2f217beb553773/cf42b045-333b-41a4-8537-397a4c2b5c16/FREE-3.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.countershell.com/get-in-touch</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-03-17</lastmod>
  </url>
  <url>
    <loc>https://www.countershell.com/home-1</loc>
    <changefreq>daily</changefreq>
    <priority>1.0</priority>
    <lastmod>2025-08-15</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/678003668d2f217beb553773/1736442748325-VBBFWF7C9QVQ1AJPGNY2/countershell-courses-graphic-1.png</image:loc>
      <image:title>Home</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/678003668d2f217beb553773/1736442748328-FYSY0HVVCOY7GAXPY2ZX/countershell-courses-graphic-2.png</image:loc>
      <image:title>Home</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/678003668d2f217beb553773/1736442748334-EWHLJWRRYP681S7JOS9L/countershell-courses-graphic-3.png</image:loc>
      <image:title>Home</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/678003668d2f217beb553773/1736442748310-IIQN6VVU167RD5SGOW62/countershell-red-team.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/678003668d2f217beb553773/1736442748315-ZWRSLYI6IMQ6WQ08U805/countershell-blue-team.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.countershell.com/cybersecurity-analysis-management</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-04-08</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/678003668d2f217beb553773/1736442750770-S77J7A6G4XE3R6QH1MSF/KK-COURSE-ICON-4.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/678003668d2f217beb553773/1736442750775-PYMU9CNNGSK0QOFBZPVJ/KK-COURSE-ICON-5.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/678003668d2f217beb553773/1736442750780-VO5KJBTQC4JLMTQ4QIMV/KK-COURSE-ICON-6.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.countershell.com/register-interest</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-03-17</lastmod>
  </url>
  <url>
    <loc>https://www.countershell.com/enroll-1</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-02-07</lastmod>
  </url>
</urlset>

