<?xml version="1.0" encoding="utf-8" standalone="yes"?><urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml"><url><loc>https://sperixlabs.org/series/ai-tool-security/</loc><lastmod>2026-04-11T18:10:00+00:00</lastmod></url><url><loc>https://sperixlabs.org/categories/</loc><lastmod>2026-04-11T18:10:00+00:00</lastmod></url><url><loc>https://sperixlabs.org/tags/claude-code/</loc><lastmod>2026-04-11T18:10:00+00:00</lastmod></url><url><loc>https://sperixlabs.org/tags/codex/</loc><lastmod>2026-04-11T18:10:00+00:00</lastmod></url><url><loc>https://sperixlabs.org/tags/copilot/</loc><lastmod>2026-04-11T18:10:00+00:00</lastmod></url><url><loc>https://sperixlabs.org/tags/cursor/</loc><lastmod>2026-04-11T18:10:00+00:00</lastmod></url><url><loc>https://sperixlabs.org/tags/llm/</loc><lastmod>2026-04-11T18:10:00+00:00</lastmod></url><url><loc>https://sperixlabs.org/tags/opencode/</loc><lastmod>2026-04-11T18:10:00+00:00</lastmod></url><url><loc>https://sperixlabs.org/posts/</loc><lastmod>2026-04-11T18:10:00+00:00</lastmod></url><url><loc>https://sperixlabs.org/tags/privacy/</loc><lastmod>2026-04-11T18:10:00+00:00</lastmod></url><url><loc>https://sperixlabs.org/categories/research/</loc><lastmod>2026-04-11T18:10:00+00:00</lastmod></url><url><loc>https://sperixlabs.org/tags/security-research/</loc><lastmod>2026-04-11T18:10:00+00:00</lastmod></url><url><loc>https://sperixlabs.org/series/</loc><lastmod>2026-04-11T18:10:00+00:00</lastmod></url><url><loc>https://sperixlabs.org/</loc><lastmod>2026-04-11T18:10:00+00:00</lastmod></url><url><loc>https://sperixlabs.org/tags/</loc><lastmod>2026-04-11T18:10:00+00:00</lastmod></url><url><loc>https://sperixlabs.org/tags/telemetry/</loc><lastmod>2026-04-11T18:10:00+00:00</lastmod></url><url><loc>https://sperixlabs.org/post/2026/04/what-leaves-your-workstation-when-you-use-an-llm-coding-cli/</loc><lastmod>2026-04-11T18:10:00+00:00</lastmod></url><url><loc>https://sperixlabs.org/tags/local-ai/</loc><lastmod>2026-02-16T12:00:00+00:00</lastmod></url><url><loc>https://sperixlabs.org/tags/ollama/</loc><lastmod>2026-02-16T12:00:00+00:00</lastmod></url><url><loc>https://sperixlabs.org/post/2026/02/ollama-forge-for-security-research-local-models-refusal-ablation-and-reproducible-pipelines/</loc><lastmod>2026-02-16T12:00:00+00:00</lastmod></url><url><loc>https://sperixlabs.org/tags/red-team/</loc><lastmod>2026-02-16T12:00:00+00:00</lastmod></url><url><loc>https://sperixlabs.org/categories/tools/</loc><lastmod>2026-02-16T12:00:00+00:00</lastmod></url><url><loc>https://sperixlabs.org/tags/arm64/</loc><lastmod>2026-02-01T10:19:53+00:00</lastmod></url><url><loc>https://sperixlabs.org/tags/binary-patching/</loc><lastmod>2026-02-01T10:19:53+00:00</lastmod></url><url><loc>https://sperixlabs.org/tags/macos/</loc><lastmod>2026-02-01T10:19:53+00:00</lastmod></url><url><loc>https://sperixlabs.org/categories/reverse-engineering/</loc><lastmod>2026-02-01T10:19:53+00:00</lastmod></url><url><loc>https://sperixlabs.org/tags/reverse-engineering/</loc><lastmod>2026-02-01T10:19:53+00:00</lastmod></url><url><loc>https://sperixlabs.org/post/2026/02/unlocking-the-vault-a-deep-dive-into-macos-arm64-trial-enforcement-and-binary-patching/</loc><lastmod>2026-02-01T10:19:53+00:00</lastmod></url><url><loc>https://sperixlabs.org/tags/android/</loc><lastmod>2025-11-10T15:26:53+00:00</lastmod></url><url><loc>https://sperixlabs.org/tags/application/</loc><lastmod>2025-11-10T15:26:53+00:00</lastmod></url><url><loc>https://sperixlabs.org/post/2025/11/malicious-code-loading-via-base64-encoded-.dex-file/</loc><lastmod>2025-11-10T15:26:53+00:00</lastmod></url><url><loc>https://sperixlabs.org/tags/security/</loc><lastmod>2025-11-10T15:26:53+00:00</lastmod></url><url><loc>https://sperixlabs.org/tags/audit/</loc><lastmod>2025-09-08T21:46:53+00:00</lastmod></url><url><loc>https://sperixlabs.org/tags/flutter/</loc><lastmod>2025-09-08T21:46:53+00:00</lastmod></url><url><loc>https://sperixlabs.org/post/2025/09/identifying-packages-used-by-flutter-apps/</loc><lastmod>2025-09-08T21:46:53+00:00</lastmod></url><url><loc>https://sperixlabs.org/tags/ios/</loc><lastmod>2025-09-08T21:46:53+00:00</lastmod></url><url><loc>https://sperixlabs.org/tags/tips/</loc><lastmod>2025-09-08T21:46:53+00:00</lastmod></url><url><loc>https://sperixlabs.org/post/2025/09/analyzing-a-weird-behavior-in-a-tenda-ax3000-wifi6-mesh-router/</loc><lastmod>2025-09-07T21:26:53+00:00</lastmod></url><url><loc>https://sperixlabs.org/tags/network/</loc><lastmod>2025-09-07T21:26:53+00:00</lastmod></url><url><loc>https://sperixlabs.org/tags/router/</loc><lastmod>2025-09-07T21:26:53+00:00</lastmod></url><url><loc>https://sperixlabs.org/categories/certifications/</loc><lastmod>2025-09-07T16:43:21+00:00</lastmod></url><url><loc>https://sperixlabs.org/tags/certifications/</loc><lastmod>2025-09-07T16:43:21+00:00</lastmod></url><url><loc>https://sperixlabs.org/categories/courses/</loc><lastmod>2025-09-07T16:43:21+00:00</lastmod></url><url><loc>https://sperixlabs.org/tags/courses/</loc><lastmod>2025-09-07T16:43:21+00:00</lastmod></url><url><loc>https://sperixlabs.org/certifications/</loc><lastmod>2025-09-07T16:43:21+00:00</lastmod></url><url><loc>https://sperixlabs.org/post/2024/11/intercepting-http-traffic-in-android-flutter-apps/</loc><lastmod>2024-11-02T09:36:53+00:00</lastmod></url><url><loc>https://sperixlabs.org/post/2024/08/frida-apk-patcher/</loc><lastmod>2024-08-16T09:36:53+00:00</lastmod></url><url><loc>https://sperixlabs.org/post/2024/05/analyzing-kd-live-memory-dump-with-volatility/</loc><lastmod>2024-05-01T09:36:53+00:00</lastmod></url><url><loc>https://sperixlabs.org/categories/forensics/</loc><lastmod>2024-05-01T09:36:53+00:00</lastmod></url><url><loc>https://sperixlabs.org/tags/forensics/</loc><lastmod>2024-05-01T09:36:53+00:00</lastmod></url><url><loc>https://sperixlabs.org/tags/malware/</loc><lastmod>2024-05-01T09:36:53+00:00</lastmod></url><url><loc>https://sperixlabs.org/tags/cordova/</loc><lastmod>2022-10-09T00:00:00+00:00</lastmod></url><url><loc>https://sperixlabs.org/tags/ionic/</loc><lastmod>2022-10-09T00:00:00+00:00</lastmod></url><url><loc>https://sperixlabs.org/post/2022/10/obscurity-is-not-security-a-case-study-of-a-cross-platform-mobile-application/</loc><lastmod>2022-10-09T00:00:00+00:00</lastmod></url><url><loc>https://sperixlabs.org/tags/react-native/</loc><lastmod>2022-10-09T00:00:00+00:00</lastmod></url><url><loc>https://sperixlabs.org/post/2022/03/protecting-your-privacy-online/</loc><lastmod>2022-03-13T18:41:53+00:00</lastmod></url><url><loc>https://sperixlabs.org/categories/tips/</loc><lastmod>2022-03-13T18:41:53+00:00</lastmod></url><url><loc>https://sperixlabs.org/post/2022/02/how-to-sign-macos-pkg-files-for-deployment/</loc><lastmod>2022-02-02T09:36:53+00:00</lastmod></url><url><loc>https://sperixlabs.org/categories/api/</loc><lastmod>2021-02-18T16:43:21+00:00</lastmod></url><url><loc>https://sperixlabs.org/tags/api/</loc><lastmod>2021-02-18T16:43:21+00:00</lastmod></url><url><loc>https://sperixlabs.org/api/</loc><lastmod>2021-02-18T16:43:21+00:00</lastmod></url><url><loc>https://sperixlabs.org/tags/publications/</loc><lastmod>2021-02-18T16:42:36+00:00</lastmod></url><url><loc>https://sperixlabs.org/tags/research/</loc><lastmod>2021-02-18T16:42:36+00:00</lastmod></url><url><loc>https://sperixlabs.org/publication/</loc><lastmod>2021-02-18T16:42:36+00:00</lastmod></url><url><loc>https://sperixlabs.org/about/</loc><lastmod>2021-01-31T22:55:13+00:00</lastmod></url><url><loc>https://sperixlabs.org/post/2021/01/possible-implementation-flaws-in-mobile-applications-a-security-audit-of-a-mobile-application/</loc><lastmod>2021-01-10T17:21:02+00:00</lastmod></url><url><loc>https://sperixlabs.org/categories/flaw/</loc><lastmod>2020-11-30T17:15:25+00:00</lastmod></url><url><loc>https://sperixlabs.org/post/2020/11/unauthorised-user-account-access-on-irokotv-platform/</loc><lastmod>2020-11-30T17:15:25+00:00</lastmod></url><url><loc>https://sperixlabs.org/post/ghpgps/</loc><lastmod>2020-10-05T17:07:23+00:00</lastmod></url><url><loc>https://sperixlabs.org/post/2020/10/ghanapostgps-rest-api/</loc><lastmod>2020-10-05T17:07:23+00:00</lastmod></url><url><loc>https://sperixlabs.org/post/</loc><lastmod>2020-10-05T17:07:23+00:00</lastmod></url><url><loc>https://sperixlabs.org/tags/rest/</loc><lastmod>2020-10-05T17:07:23+00:00</lastmod></url><url><loc>https://sperixlabs.org/post/2020/09/reverse-engineering-ghanapostgps-mobile-application-to-create-an-api-for-local-developers/</loc><lastmod>2020-09-05T17:07:23+00:00</lastmod></url><url><loc>https://sperixlabs.org/post/2020/06/a-security-analysis-of-whatsapp-ios-mobile-application/</loc><lastmod>2020-06-17T17:00:58+00:00</lastmod></url><url><loc>https://sperixlabs.org/post/2019/09/security-flaw-in-the-knust-aim-application/</loc><lastmod>2019-09-20T23:12:53+00:00</lastmod></url><url><loc>https://sperixlabs.org/search/</loc><priority>0.3</priority></url></urlset>