<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
<url>
<loc>http://octosavvi.com/presentations/wimax-hacking-2010-defcon-18/</loc>
<lastmod>2010-08-01T10:00:00-07:00</lastmod>
</url>
<url>
<loc>http://octosavvi.com/presentations/anonymizing-your-hacktop-bsidespdx-2012/</loc>
<lastmod>2012-11-09T16:00:00-08:00</lastmod>
</url>
<url>
<loc>http://octosavvi.com/presentations/computer-assisted-lockpicking-bsidespdx-2012/</loc>
<lastmod>2012-11-10T10:00:00-08:00</lastmod>
</url>
<url>
<loc>http://octosavvi.com/presentations/introduction-to-exploring-embedded-devices-bsidespdx-2013/</loc>
<lastmod>2013-09-28T14:00:00-07:00</lastmod>
</url>
<url>
<loc>http://octosavvi.com/presentations/advanced-lockpicking-techniques-bsidespdx-2014/</loc>
<lastmod>2014-10-04T15:00:00-07:00</lastmod>
</url>
<url>
<loc>http://octosavvi.com/abloy-camlock-vulnerability-disclosure/</loc>
<lastmod>2014-11-22T09:00:00-08:00</lastmod>
</url>
<url>
<loc>http://octosavvi.com/ida-pro-auto-offset/</loc>
<lastmod>2015-08-15T00:00:00-07:00</lastmod>
</url>
<url>
<loc>http://octosavvi.com/pin-tumbler-lock-interactive-diagram/</loc>
<lastmod>2016-07-21T00:00:00-07:00</lastmod>
</url>
<url>
<loc>http://octosavvi.com/tags/</loc>
</url>
<url>
<loc>http://octosavvi.com/posts/</loc>
</url>
<url>
<loc>http://octosavvi.com/</loc>
</url>
<url>
<loc>http://octosavvi.com/about/</loc>
</url>
<url>
<loc>http://octosavvi.com/page2/</loc>
</url>
<url>
<loc>http://octosavvi.com/slides/Anonymizing%20your%20hacktop%20-%20BSidesPDX2012.pdf</loc>
<lastmod>2022-09-04T16:31:03-07:00</lastmod>
</url>
<url>
<loc>http://octosavvi.com/slides/WiMAX%20Hacking%202010%20-%20DEFCON%2018.pdf</loc>
<lastmod>2022-09-04T16:31:03-07:00</lastmod>
</url>
</urlset>
