<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>Main page content on benbnyc</title>
    <link>https://example.org/</link>
    <description>Recent content in Main page content on benbnyc</description>
    <generator>Hugo -- gohugo.io</generator>
    <language>en</language>
    <copyright>© 2026 benbnyc</copyright>
    <lastBuildDate>Sat, 18 Apr 2026 18:55:52 -0400</lastBuildDate><atom:link href="https://example.org/index.xml" rel="self" type="application/rss+xml" />
    
    <item>
      <title>About This Site/Me</title>
      <link>https://example.org/about/</link>
      <pubDate>Sat, 18 Apr 2026 18:55:52 -0400</pubDate>
      
      <guid>https://example.org/about/</guid>
      <description>About this site/me</description>
      
    </item>
    
    <item>
      <title>Reversec Webinar: Going behind the scenes of bug bounty to strengthen enterprise security</title>
      <link>https://example.org/publishing/bug-bounty-webinar/</link>
      <pubDate>Thu, 30 Oct 2025 00:00:00 +0000</pubDate>
      
      <guid>https://example.org/publishing/bug-bounty-webinar/</guid>
      <description>A webinar on how bug bounty programs harness crowdsourced security research to uncover vulnerabilities and strengthen organizational resilience. We discuss how to triage, prioritize, and manage findings effectively alongside traditional pentesting.</description>
      <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://example.org/publishing/bug-bounty-webinar/featured-webinar.jpg" />
    </item>
    
    <item>
      <title>Reversec Briefing: Bug Bounty behind the scenes</title>
      <link>https://example.org/publishing/bug-bounty-behind-the-scenes/</link>
      <pubDate>Mon, 30 Jun 2025 00:00:00 +0000</pubDate>
      
      <guid>https://example.org/publishing/bug-bounty-behind-the-scenes/</guid>
      <description>A video of a talk on how bug bounty programs work from researcher submission through triage, reward, retesting, and resolution. Plus, how companies balance them with traditional pentesting and avoid common pitfalls.</description>
      <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://example.org/publishing/bug-bounty-behind-the-scenes/featured-briefing.jpg" />
    </item>
    
    <item>
      <title>Prototype Pollution Primer for Pentesters and Programmers</title>
      <link>https://example.org/publishing/prototype-pollution-primer/</link>
      <pubDate>Thu, 08 Sep 2022 00:00:00 +0000</pubDate>
      
      <guid>https://example.org/publishing/prototype-pollution-primer/</guid>
      <description>A hands-on walkthrough of prototype pollution in JavaScript — how attackers corrupt &lt;code&gt;Object.prototype&lt;/code&gt; to achieve DOM-based XSS, with exploit demos and mitigations</description>
      
    </item>
    
    <item>
      <title>Probable Wordlists</title>
      <link>https://example.org/projects/probable-wordlists/</link>
      <pubDate>Wed, 04 Dec 2019 00:00:00 +0000</pubDate>
      
      <guid>https://example.org/projects/probable-wordlists/</guid>
      <description>My early career magnum opus. Wordlists sorted by probability originally created for password generation and testing.</description>
      <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://example.org/projects/probable-wordlists/featured-probablewordlists.png" />
    </item>
    
    <item>
      <title>BEWGor</title>
      <link>https://example.org/projects/bewgor/</link>
      <pubDate>Fri, 16 Nov 2018 00:00:00 +0000</pubDate>
      
      <guid>https://example.org/projects/bewgor/</guid>
      <description>Bull&amp;rsquo;s Eye Wordlist Generator - Does your password rely on predictable patterns of accessible info?</description>
      <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://example.org/projects/bewgor/featured-bewgor.png" />
    </item>
    
    <item>
      <title>CTF Writeup: DerpNStink on HackTheBox</title>
      <link>https://example.org/archive/ctf-writeups/derpnstink-vulnhub/</link>
      <pubDate>Mon, 26 Mar 2018 00:00:00 +0000</pubDate>
      
      <guid>https://example.org/archive/ctf-writeups/derpnstink-vulnhub/</guid>
      <description></description>
      <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://example.org/archive/ctf-writeups/derpnstink-vulnhub/feature-Dg6sbq1.png" />
    </item>
    
    <item>
      <title>CTF Writeup: Shocker on HackTheBox</title>
      <link>https://example.org/archive/ctf-writeups/shocker-htb/</link>
      <pubDate>Sat, 17 Feb 2018 00:00:00 +0000</pubDate>
      
      <guid>https://example.org/archive/ctf-writeups/shocker-htb/</guid>
      <description></description>
      <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://example.org/archive/ctf-writeups/shocker-htb/feature-Fs0cms1.png" />
    </item>
    
    <item>
      <title>Password Advice for Everyone</title>
      <link>https://example.org/blog/password-advice-for-everyone/</link>
      <pubDate>Thu, 08 Feb 2018 00:00:00 +0000</pubDate>
      
      <guid>https://example.org/blog/password-advice-for-everyone/</guid>
      <description>Essential steps to secure your accounts: use unique passwords, enable 2FA, and avoid common password mistakes.</description>
      
    </item>
    
    <item>
      <title>Actionable Password Advice Based on the Probable Wordlists</title>
      <link>https://example.org/blog/actionable-password-advice-based-on-the-probable-wordlists/</link>
      <pubDate>Wed, 31 Jan 2018 00:00:00 +0000</pubDate>
      
      <guid>https://example.org/blog/actionable-password-advice-based-on-the-probable-wordlists/</guid>
      <description>Why unique passwords matter, what makes them vulnerable to attack, and how to create strong yet memorable ones - based on the Probable Wordlists v2</description>
      <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://example.org/blog/actionable-password-advice-based-on-the-probable-wordlists/feature-ProbableWordlistLogo.png" />
    </item>
    
    <item>
      <title>CTF Writeup: Solid State on HackTheBox</title>
      <link>https://example.org/archive/ctf-writeups/solidstate-htb/</link>
      <pubDate>Sat, 27 Jan 2018 00:00:00 +0000</pubDate>
      
      <guid>https://example.org/archive/ctf-writeups/solidstate-htb/</guid>
      <description></description>
      <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://example.org/archive/ctf-writeups/solidstate-htb/feature-TiihkOi.png" />
    </item>
    
    <item>
      <title>Your First CTF 2 - Taming the Bulldog</title>
      <link>https://example.org/archive/your-first-ctf/yourfirstctf-2/</link>
      <pubDate>Tue, 23 Jan 2018 00:00:00 +0000</pubDate>
      
      <guid>https://example.org/archive/your-first-ctf/yourfirstctf-2/</guid>
      <description>Tame the bulldog with your newfound skills!</description>
      <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://example.org/archive/your-first-ctf/yourfirstctf-2/feature-qVCywPE.jpg" />
    </item>
    
    <item>
      <title>Your First CTF 1 - Intro and Setup</title>
      <link>https://example.org/archive/your-first-ctf/yourfirstctf-1/</link>
      <pubDate>Wed, 17 Jan 2018 00:00:00 +0000</pubDate>
      
      <guid>https://example.org/archive/your-first-ctf/yourfirstctf-1/</guid>
      <description>Get your first hacking lab running! Walk through setting up virtual machines, connecting them, and prepping your tools. No experience needed!</description>
      <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://example.org/archive/your-first-ctf/yourfirstctf-1/feature-firstctflogo.png" />
    </item>
    
    <item>
      <title>CTF Writeup: Blue on HackTheBox</title>
      <link>https://example.org/archive/ctf-writeups/blue-htb/</link>
      <pubDate>Fri, 12 Jan 2018 00:00:00 +0000</pubDate>
      
      <guid>https://example.org/archive/ctf-writeups/blue-htb/</guid>
      <description></description>
      <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://example.org/archive/ctf-writeups/blue-htb/feature-ZQYZ6mJ.png" />
    </item>
    
    <item>
      <title>CTF Writeup: Mirai on HackTheBox</title>
      <link>https://example.org/archive/ctf-writeups/mirai-htb/</link>
      <pubDate>Wed, 10 Jan 2018 00:00:00 +0000</pubDate>
      
      <guid>https://example.org/archive/ctf-writeups/mirai-htb/</guid>
      <description></description>
      <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://example.org/archive/ctf-writeups/mirai-htb/feature-RqLR1q1.png" />
    </item>
    
    <item>
      <title>CTF Writeup: Blocky on HackTheBox</title>
      <link>https://example.org/archive/ctf-writeups/blocky-htb/</link>
      <pubDate>Sat, 09 Dec 2017 00:00:00 +0000</pubDate>
      
      <guid>https://example.org/archive/ctf-writeups/blocky-htb/</guid>
      <description></description>
      <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://example.org/archive/ctf-writeups/blocky-htb/feature-Y0d03Mo.png" />
    </item>
    
    <item>
      <title>CTF Writeup: Europa on HackTheBox</title>
      <link>https://example.org/archive/ctf-writeups/europa-htb/</link>
      <pubDate>Sat, 02 Dec 2017 00:00:00 +0000</pubDate>
      
      <guid>https://example.org/archive/ctf-writeups/europa-htb/</guid>
      <description></description>
      <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://example.org/archive/ctf-writeups/europa-htb/feature-iDTsn80.png" />
    </item>
    
    <item>
      <title>ZorZ - A Few WebApp File Upload Vulnerabilities Explained</title>
      <link>https://example.org/archive/ctf-writeups/zorz-vulnhub/</link>
      <pubDate>Mon, 20 Nov 2017 00:00:00 +0000</pubDate>
      
      <guid>https://example.org/archive/ctf-writeups/zorz-vulnhub/</guid>
      <description></description>
      <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://example.org/archive/ctf-writeups/zorz-vulnhub/feature-IAAnDbY.png" />
    </item>
    
    <item>
      <title>CTF Writeup: Bulldog on Vulnhub</title>
      <link>https://example.org/archive/ctf-writeups/bulldog-vulnhub-nonintro/</link>
      <pubDate>Sat, 11 Nov 2017 00:00:00 +0000</pubDate>
      
      <guid>https://example.org/archive/ctf-writeups/bulldog-vulnhub-nonintro/</guid>
      <description></description>
      <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://example.org/archive/ctf-writeups/bulldog-vulnhub-nonintro/feature-NYBLh9T.jpg" />
    </item>
    
    <item>
      <title>CTF Writeup: LazySysAdmin on VulnHub</title>
      <link>https://example.org/archive/ctf-writeups/lazysysadmin-vulnhub/</link>
      <pubDate>Wed, 08 Nov 2017 00:00:00 +0000</pubDate>
      
      <guid>https://example.org/archive/ctf-writeups/lazysysadmin-vulnhub/</guid>
      <description></description>
      <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://example.org/archive/ctf-writeups/lazysysadmin-vulnhub/feature-iFDpFwb.jpg" />
    </item>
    
    <item>
      <title>CTF Writeup: Optimum on HackTheBox</title>
      <link>https://example.org/archive/ctf-writeups/optimum-htb/</link>
      <pubDate>Mon, 30 Oct 2017 00:00:00 +0000</pubDate>
      
      <guid>https://example.org/archive/ctf-writeups/optimum-htb/</guid>
      <description></description>
      <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://example.org/archive/ctf-writeups/optimum-htb/feature-cZ0VXqB.png" />
    </item>
    
    <item>
      <title>CTF Writeup: Zico on VulnHub</title>
      <link>https://example.org/archive/ctf-writeups/zico-vulnhub/</link>
      <pubDate>Sun, 12 Mar 2017 00:00:00 +0000</pubDate>
      
      <guid>https://example.org/archive/ctf-writeups/zico-vulnhub/</guid>
      <description></description>
      <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://example.org/archive/ctf-writeups/zico-vulnhub/feature-8DXYHCH.png" />
    </item>
    
    <item>
      <title>(RETIRED) WorstPasswords Twitter Bot</title>
      <link>https://example.org/blog/worstpasswords/</link>
      <pubDate>Fri, 17 Feb 2017 00:00:00 +0000</pubDate>
      
      <guid>https://example.org/blog/worstpasswords/</guid>
      <description>A (now retired) automated Twitter bot that tweeted the worst passwords found in the Probable Wordlists V2.</description>
      <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://example.org/blog/worstpasswords/feature-crackedlock.png" />
    </item>
    
  </channel>
</rss>
