<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/unix/webapp/opensis_chain_exec</loc>
    <lastmod>2026-04-15T10:17:33+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/unix/webapp/phpcollab_upload_exec</loc>
    <lastmod>2026-04-15T10:17:33+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/unix/webapp/piwik_superuser_plugin_upload</loc>
    <lastmod>2026-04-15T10:17:33+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/unix/webapp/rconfig_install_cmd_exec</loc>
    <lastmod>2026-04-15T10:17:33+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/unix/webapp/thinkphp_rce</loc>
    <lastmod>2026-04-15T10:17:33+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/unix/webapp/trixbox_ce_endpoint_devicemap_rce</loc>
    <lastmod>2026-04-15T10:17:33+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/unix/webapp/vicidial_agent_authenticated_rce</loc>
    <lastmod>2026-04-15T10:17:33+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/unix/webapp/vicidial_user_authorization_unauth_cmd_exec</loc>
    <lastmod>2026-04-15T10:17:33+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/unix/webapp/webmin_upload_exec</loc>
    <lastmod>2026-04-15T10:17:33+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/unix/webapp/wp_admin_shell_upload</loc>
    <lastmod>2026-04-15T10:17:33+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/unix/webapp/wp_infinitewp_auth_bypass</loc>
    <lastmod>2026-04-15T10:17:33+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/unix/webapp/wp_mobile_detector_upload_execute</loc>
    <lastmod>2026-04-15T10:17:33+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/unix/webapp/wp_phpmailer_host_header</loc>
    <lastmod>2026-04-15T10:17:33+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/unix/webapp/wp_pie_register_bypass_rce</loc>
    <lastmod>2026-04-15T10:17:33+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/unix/webapp/wp_plainview_activity_monitor_rce</loc>
    <lastmod>2026-04-15T10:17:34+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/unix/webapp/wp_wpdiscuz_unauthenticated_file_upload</loc>
    <lastmod>2026-04-15T10:17:34+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/unix/webapp/xymon_useradm_cmd_exec</loc>
    <lastmod>2026-04-15T10:17:34+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/unix/webapp/zoneminder_lang_exec</loc>
    <lastmod>2026-04-15T10:17:34+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/unix/webapp/zoneminder_snapshots</loc>
    <lastmod>2026-04-15T10:17:34+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/unix/x11/x11_keyboard_exec</loc>
    <lastmod>2026-04-15T10:17:34+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/antivirus/ams_hndlrsvc</loc>
    <lastmod>2026-04-15T10:17:34+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/backdoor/energizer_duo_payload</loc>
    <lastmod>2026-04-15T10:17:34+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/backupexec/ssl_uaf</loc>
    <lastmod>2026-04-15T10:17:34+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/browser/chrome_filereader_uaf</loc>
    <lastmod>2026-04-15T10:17:36+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/browser/cisco_webex_ext</loc>
    <lastmod>2026-04-15T10:17:36+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/browser/exodus</loc>
    <lastmod>2026-04-15T10:17:36+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/browser/firefox_smil_uaf</loc>
    <lastmod>2026-04-15T10:17:36+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/browser/getgodm_http_response_bof</loc>
    <lastmod>2026-04-15T10:17:36+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/browser/ms08_070_visual_studio_msmask</loc>
    <lastmod>2026-04-15T10:17:36+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/browser/ms14_064_ole_code_execution</loc>
    <lastmod>2026-04-15T10:17:36+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/dcerpc/cve_2021_1675_printnightmare</loc>
    <lastmod>2026-04-15T10:17:36+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/dcerpc/ms03_026_dcom</loc>
    <lastmod>2026-04-15T10:17:36+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/fileformat/adobe_geticon</loc>
    <lastmod>2026-04-15T10:17:36+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/fileformat/adobe_pdf_embedded_exe</loc>
    <lastmod>2026-04-15T10:17:36+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/fileformat/adobe_reader_u3d</loc>
    <lastmod>2026-04-15T10:17:36+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/fileformat/adobe_utilprintf</loc>
    <lastmod>2026-04-15T10:17:36+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/fileformat/boxoft_wav_to_mp3</loc>
    <lastmod>2026-04-15T10:17:36+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/fileformat/cve_2017_8464_lnk_rce</loc>
    <lastmod>2026-04-15T10:17:36+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/fileformat/cyberlink_lpp_bof</loc>
    <lastmod>2026-04-15T10:17:36+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/fileformat/documalis_pdf_editor_and_scanner</loc>
    <lastmod>2026-04-15T10:17:36+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/fileformat/dupscout_xml</loc>
    <lastmod>2026-04-15T10:17:36+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/fileformat/foxit_reader_uaf</loc>
    <lastmod>2026-04-15T10:17:36+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/fileformat/greenshot_deserialize_cve_2023_34634</loc>
    <lastmod>2026-04-15T10:17:36+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/fileformat/microsoft_windows_contact</loc>
    <lastmod>2026-04-15T10:17:36+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/fileformat/ms15_100_mcl_exe</loc>
    <lastmod>2026-04-15T10:17:36+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/fileformat/ms_visual_basic_vbp</loc>
    <lastmod>2026-04-15T10:17:36+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/fileformat/nitro_reader_jsapi</loc>
    <lastmod>2026-04-15T10:17:36+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/fileformat/office_dde_delivery</loc>
    <lastmod>2026-04-15T10:17:36+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/fileformat/office_excel_slk</loc>
    <lastmod>2026-04-15T10:17:36+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/fileformat/office_ms17_11882</loc>
    <lastmod>2026-04-15T10:17:36+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/fileformat/office_word_hta</loc>
    <lastmod>2026-04-15T10:17:36+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/fileformat/syncbreeze_xml</loc>
    <lastmod>2026-04-15T10:17:36+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/fileformat/theme_dll_hijack_cve_2023_38146</loc>
    <lastmod>2026-04-15T10:17:36+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/fileformat/unc_url_cve_2025_33053</loc>
    <lastmod>2026-04-15T10:17:36+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/fileformat/vlc_mkv</loc>
    <lastmod>2026-04-15T10:17:36+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/fileformat/windows_registration_entries</loc>
    <lastmod>2026-04-15T10:17:36+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/fileformat/windows_script_host_jscript</loc>
    <lastmod>2026-04-15T10:17:36+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/fileformat/windows_script_host_vbscript</loc>
    <lastmod>2026-04-15T10:17:36+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/fileformat/windows_script_host_wsf</loc>
    <lastmod>2026-04-15T10:17:36+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/fileformat/winrar_ace</loc>
    <lastmod>2026-04-15T10:17:36+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/fileformat/winrar_cve_2023_38831</loc>
    <lastmod>2026-04-15T10:17:36+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/fileformat/word_msdtjs_rce</loc>
    <lastmod>2026-04-15T10:17:36+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/fileformat/word_mshtml_rce</loc>
    <lastmod>2026-04-15T10:17:36+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/fileformat/zahir_enterprise_plus_csv</loc>
    <lastmod>2026-04-15T10:17:36+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/ftp/ayukov_nftp</loc>
    <lastmod>2026-04-15T10:17:36+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/ftp/ftpshell_cli_bof</loc>
    <lastmod>2026-04-15T10:17:36+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/ftp/labf_nfsaxe</loc>
    <lastmod>2026-04-15T10:17:36+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/ftp/sami_ftpd_user</loc>
    <lastmod>2026-04-15T10:17:36+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/ftp/wing_ftp_admin_exec</loc>
    <lastmod>2026-04-15T10:17:36+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/http/advantech_iview_networkservlet_cmd_inject</loc>
    <lastmod>2026-04-15T10:17:36+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/http/advantech_iview_unauth_rce</loc>
    <lastmod>2026-04-15T10:17:36+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/http/ajaxpro_deserialization_rce</loc>
    <lastmod>2026-04-15T10:17:36+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/http/apache_activemq_traversal_upload</loc>
    <lastmod>2026-04-15T10:17:37+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/http/apache_tika_jp2_jscript</loc>
    <lastmod>2026-04-15T10:17:37+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/http/cayin_xpost_sql_rce</loc>
    <lastmod>2026-04-15T10:17:37+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/http/commvault_rce_cve_2025_57790_cve_2025_57791</loc>
    <lastmod>2026-04-15T10:17:37+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/http/desktopcentral_deserialization</loc>
    <lastmod>2026-04-15T10:17:37+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/http/disk_pulse_enterprise_get</loc>
    <lastmod>2026-04-15T10:17:37+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/http/diskboss_get_bof</loc>
    <lastmod>2026-04-15T10:17:37+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/http/disksavvy_get_bof</loc>
    <lastmod>2026-04-15T10:17:37+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/http/disksorter_bof</loc>
    <lastmod>2026-04-15T10:17:37+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/http/dlink_central_wifimanager_rce</loc>
    <lastmod>2026-04-15T10:17:37+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/http/dnn_cookie_deserialization_rce</loc>
    <lastmod>2026-04-15T10:17:37+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/http/dup_scout_enterprise_login_bof</loc>
    <lastmod>2026-04-15T10:17:37+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/http/dupscts_bof</loc>
    <lastmod>2026-04-15T10:17:37+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/http/easychatserver_seh</loc>
    <lastmod>2026-04-15T10:17:37+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/http/easyfilesharing_post</loc>
    <lastmod>2026-04-15T10:17:37+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/http/ektron_xslt_exec_ws</loc>
    <lastmod>2026-04-15T10:17:37+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/http/exchange_chainedserializationbinder_rce</loc>
    <lastmod>2026-04-15T10:17:37+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/http/exchange_ecp_dlp_policy</loc>
    <lastmod>2026-04-15T10:17:37+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/http/exchange_ecp_viewstate</loc>
    <lastmod>2026-04-15T10:17:37+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/http/exchange_proxylogon_rce</loc>
    <lastmod>2026-04-15T10:17:37+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/http/exchange_proxynotshell_rce</loc>
    <lastmod>2026-04-15T10:17:37+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/http/exchange_proxyshell_rce</loc>
    <lastmod>2026-04-15T10:17:37+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/http/file_sharing_wizard_seh</loc>
    <lastmod>2026-04-15T10:17:37+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/http/flexdotnetcms_upload_exec</loc>
    <lastmod>2026-04-15T10:17:37+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/http/forticlient_ems_fctid_sqli</loc>
    <lastmod>2026-04-15T10:17:37+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/http/fortilogger_arbitrary_fileupload</loc>
    <lastmod>2026-04-15T10:17:37+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/http/geutebrueck_gcore_x64_rce_bo</loc>
    <lastmod>2026-04-15T10:17:37+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/http/git_lfs_rce</loc>
    <lastmod>2026-04-15T10:17:37+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/http/gitstack_rce</loc>
    <lastmod>2026-04-15T10:17:37+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/http/gladinet_viewstate_deserialization_cve_2025_30406</loc>
    <lastmod>2026-04-15T10:17:37+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/http/hp_imc_java_deserialize</loc>
    <lastmod>2026-04-15T10:17:37+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/http/hpe_sim_76_amf_deserialization</loc>
    <lastmod>2026-04-15T10:17:37+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/http/ivanti_avalanche_filestoreconfig_upload</loc>
    <lastmod>2026-04-15T10:17:37+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/http/ivanti_epm_recordgoodapp_sqli_rce</loc>
    <lastmod>2026-04-15T10:17:37+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/http/kentico_staging_syncserver</loc>
    <lastmod>2026-04-15T10:17:37+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/http/lg_simple_editor_rce</loc>
    <lastmod>2026-04-15T10:17:37+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/http/lg_simple_editor_rce_uploadvideo</loc>
    <lastmod>2026-04-15T10:17:37+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/http/magicinfo_traversal</loc>
    <lastmod>2026-04-15T10:17:37+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/http/manage_engine_opmanager_rce</loc>
    <lastmod>2026-04-15T10:17:37+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/http/manageengine_adaudit_plus_authenticated_rce</loc>
    <lastmod>2026-04-15T10:17:37+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/http/manageengine_adaudit_plus_cve_2022_28219</loc>
    <lastmod>2026-04-15T10:17:37+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/http/manageengine_admanager_plus_cve_2023_29084_auth_cmd_injection</loc>
    <lastmod>2026-04-15T10:17:37+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/http/manageengine_adselfservice_plus_cve_2021_40539</loc>
    <lastmod>2026-04-15T10:17:37+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/http/manageengine_adselfservice_plus_cve_2022_28810</loc>
    <lastmod>2026-04-15T10:17:37+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/http/manageengine_adshacluster_rce</loc>
    <lastmod>2026-04-15T10:17:37+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/http/manageengine_appmanager_exec</loc>
    <lastmod>2026-04-15T10:17:37+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/http/manageengine_connectionid_write</loc>
    <lastmod>2026-04-15T10:17:37+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/http/manageengine_endpoint_central_saml_rce_cve_2022_47966</loc>
    <lastmod>2026-04-15T10:17:37+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/http/manageengine_servicedesk_plus_cve_2021_44077</loc>
    <lastmod>2026-04-15T10:17:37+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/http/moveit_cve_2023_34362</loc>
    <lastmod>2026-04-15T10:17:37+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/http/netgear_nms_rce</loc>
    <lastmod>2026-04-15T10:17:37+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/http/netmotion_mobility_mvcutil_deserialization</loc>
    <lastmod>2026-04-15T10:17:37+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/http/northstar_c2_xss_to_agent_rce</loc>
    <lastmod>2026-04-15T10:17:37+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/http/nscp_authenticated_rce</loc>
    <lastmod>2026-04-15T10:17:37+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/http/oats_weblogic_console</loc>
    <lastmod>2026-04-15T10:17:37+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/http/octopusdeploy_deploy</loc>
    <lastmod>2026-04-15T10:17:37+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/http/pgadmin_binary_path_api</loc>
    <lastmod>2026-04-15T10:17:37+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/http/php_cgi_arg_injection_rce_cve_2024_4577</loc>
    <lastmod>2026-04-15T10:17:37+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/http/plesk_mylittleadmin_viewstate</loc>
    <lastmod>2026-04-15T10:17:37+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/http/plex_unpickle_dict_rce</loc>
    <lastmod>2026-04-15T10:17:37+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/http/prtg_authenticated_rce</loc>
    <lastmod>2026-04-15T10:17:37+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/http/prtg_authenticated_rce_cve_2023_32781</loc>
    <lastmod>2026-04-15T10:17:37+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/http/rejetto_hfs_rce_cve_2024_23692</loc>
    <lastmod>2026-04-15T10:17:37+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/http/serviio_checkstreamurl_cmd_exec</loc>
    <lastmod>2026-04-15T10:17:37+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/http/sharepoint_data_deserialization</loc>
    <lastmod>2026-04-15T10:17:37+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/http/sharepoint_dynamic_proxy_generator_unauth_rce</loc>
    <lastmod>2026-04-15T10:17:37+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/http/sharepoint_ssi_viewstate</loc>
    <lastmod>2026-04-15T10:17:37+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/http/sharepoint_toolpane_rce</loc>
    <lastmod>2026-04-15T10:17:37+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/http/sharepoint_unsafe_control</loc>
    <lastmod>2026-04-15T10:17:37+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/http/sharepoint_workflows_xoml</loc>
    <lastmod>2026-04-15T10:17:37+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/http/sitecore_xp_cve_2021_42237</loc>
    <lastmod>2026-04-15T10:17:37+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/http/sitecore_xp_cve_2025_27218</loc>
    <lastmod>2026-04-15T10:17:37+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/http/sitecore_xp_cve_2025_34510</loc>
    <lastmod>2026-04-15T10:17:37+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/http/sitecore_xp_cve_2025_34511</loc>
    <lastmod>2026-04-15T10:17:37+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/http/smartermail_rce</loc>
    <lastmod>2026-04-15T10:17:37+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/http/softing_sis_rce</loc>
    <lastmod>2026-04-15T10:17:37+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/http/ssrs_navcorrector_viewstate</loc>
    <lastmod>2026-04-15T10:17:37+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/http/syncbreeze_bof</loc>
    <lastmod>2026-04-15T10:17:37+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/http/telerik_rau_deserialization</loc>
    <lastmod>2026-04-15T10:17:37+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/http/telerik_report_server_deserialization</loc>
    <lastmod>2026-04-15T10:17:37+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/http/tomcat_cgi_cmdlineargs</loc>
    <lastmod>2026-04-15T10:17:37+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/http/trendmicro_officescan_widget_exec</loc>
    <lastmod>2026-04-15T10:17:37+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/http/vxsrchs_bof</loc>
    <lastmod>2026-04-15T10:17:37+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/http/ws_ftp_rce_cve_2023_40044</loc>
    <lastmod>2026-04-15T10:17:37+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/http/wsus_deserialization_rce</loc>
    <lastmod>2026-04-15T10:17:37+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/http/zentao_pro_rce</loc>
    <lastmod>2026-04-15T10:17:37+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/http/zoho_password_manager_pro_xml_rpc_rce</loc>
    <lastmod>2026-04-15T10:17:37+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/ibm/ibm_was_dmgr_java_deserialization_rce</loc>
    <lastmod>2026-04-15T10:17:37+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/iis/iis_webdav_upload_asp</loc>
    <lastmod>2026-04-15T10:17:37+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/iis/ms01_023_printer</loc>
    <lastmod>2026-04-15T10:17:37+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/iis/ms01_026_dbldecode</loc>
    <lastmod>2026-04-15T10:17:37+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/iis/ms02_065_msadc</loc>
    <lastmod>2026-04-15T10:17:37+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/iis/ms03_007_ntdll_webdav</loc>
    <lastmod>2026-04-15T10:17:37+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/imap/mercury_login</loc>
    <lastmod>2026-04-15T10:17:37+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/local/alpc_taskscheduler</loc>
    <lastmod>2026-04-15T10:17:37+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/local/anyconnect_lpe</loc>
    <lastmod>2026-04-15T10:17:37+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/local/appxsvc_hard_link_privesc</loc>
    <lastmod>2026-04-15T10:17:37+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/local/bits_ntlm_token_impersonation</loc>
    <lastmod>2026-04-15T10:17:37+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/local/bypassuac_comhijack</loc>
    <lastmod>2026-04-15T10:17:37+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/local/bypassuac_dotnet_profiler</loc>
    <lastmod>2026-04-15T10:17:37+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/local/bypassuac_fodhelper</loc>
    <lastmod>2026-04-15T10:17:37+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/local/bypassuac_injection_winsxs</loc>
    <lastmod>2026-04-15T10:17:37+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/local/bypassuac_sdclt</loc>
    <lastmod>2026-04-15T10:17:37+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/local/bypassuac_silentcleanup</loc>
    <lastmod>2026-04-15T10:17:37+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/local/bypassuac_sluihijack</loc>
    <lastmod>2026-04-15T10:17:37+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/local/bypassuac_windows_store_reg</loc>
    <lastmod>2026-04-15T10:17:37+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/local/canon_driver_privesc</loc>
    <lastmod>2026-04-15T10:17:37+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/local/comahawk</loc>
    <lastmod>2026-04-15T10:17:37+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/local/cve_2017_8464_lnk_lpe</loc>
    <lastmod>2026-04-15T10:17:37+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/local/cve_2018_8453_win32k_priv_esc</loc>
    <lastmod>2026-04-15T10:17:37+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/local/cve_2019_1458_wizardopium</loc>
    <lastmod>2026-04-15T10:17:37+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/local/cve_2020_0668_service_tracing</loc>
    <lastmod>2026-04-15T10:17:37+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/local/cve_2020_0787_bits_arbitrary_file_move</loc>
    <lastmod>2026-04-15T10:17:37+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/local/cve_2020_0796_smbghost</loc>
    <lastmod>2026-04-15T10:17:37+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/local/cve_2020_1048_printerdemon</loc>
    <lastmod>2026-04-15T10:17:37+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/local/cve_2020_1054_drawiconex_lpe</loc>
    <lastmod>2026-04-15T10:17:37+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/local/cve_2020_1313_system_orchestrator</loc>
    <lastmod>2026-04-15T10:17:37+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/local/cve_2020_1337_printerdemon</loc>
    <lastmod>2026-04-15T10:17:37+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/local/cve_2020_17136</loc>
    <lastmod>2026-04-15T10:17:37+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/local/cve_2021_21551_dbutil_memmove</loc>
    <lastmod>2026-04-15T10:17:37+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/local/cve_2021_40449</loc>
    <lastmod>2026-04-15T10:17:37+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/local/cve_2022_21882_win32k</loc>
    <lastmod>2026-04-15T10:17:37+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/local/cve_2022_21999_spoolfool_privesc</loc>
    <lastmod>2026-04-15T10:17:37+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/local/cve_2022_26904_superprofile</loc>
    <lastmod>2026-04-15T10:17:37+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/local/cve_2022_3699_lenovo_diagnostics_driver</loc>
    <lastmod>2026-04-15T10:17:37+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/local/cve_2023_21768_afd_lpe</loc>
    <lastmod>2026-04-15T10:17:37+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/local/cve_2023_28252_clfs_driver</loc>
    <lastmod>2026-04-15T10:17:37+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/local/cve_2024_30085_cloud_files</loc>
    <lastmod>2026-04-15T10:17:37+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/local/cve_2024_30088_authz_basep</loc>
    <lastmod>2026-04-15T10:17:37+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/local/cve_2024_35250_ks_driver</loc>
    <lastmod>2026-04-15T10:17:37+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/local/dnsadmin_serverlevelplugindll</loc>
    <lastmod>2026-04-15T10:17:37+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/local/docker_credential_wincred</loc>
    <lastmod>2026-04-15T10:17:37+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/local/druva_insync_insynccphwnet64_rcp_type_5_priv_esc</loc>
    <lastmod>2026-04-15T10:17:37+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/local/gog_galaxyclientservice_privesc</loc>
    <lastmod>2026-04-15T10:17:37+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/local/lexmark_driver_privesc</loc>
    <lastmod>2026-04-15T10:17:37+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/local/linqpad_deserialization_persistence</loc>
    <lastmod>2026-04-15T10:17:37+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/local/microfocus_operations_privesc</loc>
    <lastmod>2026-04-15T10:17:37+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/local/mov_ss</loc>
    <lastmod>2026-04-15T10:17:37+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/local/ms10_092_schelevator</loc>
    <lastmod>2026-04-15T10:17:38+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/local/ms16_014_wmi_recv_notif</loc>
    <lastmod>2026-04-15T10:17:38+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/local/ms16_016_webdav</loc>
    <lastmod>2026-04-15T10:17:38+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/local/ms16_075_reflection</loc>
    <lastmod>2026-04-15T10:17:38+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/local/ms16_075_reflection_juicy</loc>
    <lastmod>2026-04-15T10:17:38+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/local/ms16_reflection</loc>
    <lastmod>2026-04-15T10:17:38+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/local/ms18_8120_win32k_privesc</loc>
    <lastmod>2026-04-15T10:17:38+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/local/nscp_pe</loc>
    <lastmod>2026-04-15T10:17:38+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/local/ntusermndragover</loc>
    <lastmod>2026-04-15T10:17:38+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/local/panda_psevents</loc>
    <lastmod>2026-04-15T10:17:38+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/local/payload_inject</loc>
    <lastmod>2026-04-15T10:17:38+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/local/plantronics_hub_spokesupdateservice_privesc</loc>
    <lastmod>2026-04-15T10:17:38+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/local/ps_persist</loc>
    <lastmod>2026-04-15T10:17:38+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/local/ricoh_driver_privesc</loc>
    <lastmod>2026-04-15T10:17:38+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/local/service_permissions</loc>
    <lastmod>2026-04-15T10:17:38+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/local/srclient_dll_hijacking</loc>
    <lastmod>2026-04-15T10:17:38+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/local/tokenmagic</loc>
    <lastmod>2026-04-15T10:17:38+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/local/unquoted_service_path</loc>
    <lastmod>2026-04-15T10:17:38+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/local/webexec</loc>
    <lastmod>2026-04-15T10:17:38+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/local/win_error_cve_2023_36874</loc>
    <lastmod>2026-04-15T10:17:38+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/local/windscribe_windscribeservice_priv_esc</loc>
    <lastmod>2026-04-15T10:17:38+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/misc/ahsay_backup_fileupload</loc>
    <lastmod>2026-04-15T10:17:38+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/misc/ais_esel_server_rce</loc>
    <lastmod>2026-04-15T10:17:38+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/misc/cloudme_sync</loc>
    <lastmod>2026-04-15T10:17:38+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/misc/commvault_cmd_exec</loc>
    <lastmod>2026-04-15T10:17:38+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/misc/crosschex_device_bof</loc>
    <lastmod>2026-04-15T10:17:38+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/misc/cve_2022_28381_allmediaserver_bof</loc>
    <lastmod>2026-04-15T10:17:38+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/misc/delta_electronics_infrasuite_deserialization</loc>
    <lastmod>2026-04-15T10:17:38+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/misc/disk_savvy_adm</loc>
    <lastmod>2026-04-15T10:17:38+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/misc/gh0st</loc>
    <lastmod>2026-04-15T10:17:38+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/misc/hp_dataprotector_encrypted_comms</loc>
    <lastmod>2026-04-15T10:17:38+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/misc/hp_imc_dbman_restartdb_unauth_rce</loc>
    <lastmod>2026-04-15T10:17:38+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/misc/hp_imc_dbman_restoredbase_unauth_rce</loc>
    <lastmod>2026-04-15T10:17:38+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/misc/hp_loadrunner_magentproc_cmdexec</loc>
    <lastmod>2026-04-15T10:17:38+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/misc/ivanti_agent_portal_cmdexec</loc>
    <lastmod>2026-04-15T10:17:38+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/misc/ivanti_avalanche_mdm_bof</loc>
    <lastmod>2026-04-15T10:17:38+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/misc/mobile_mouse_rce</loc>
    <lastmod>2026-04-15T10:17:38+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/misc/ncr_cmcagent_rce</loc>
    <lastmod>2026-04-15T10:17:38+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/misc/plugx</loc>
    <lastmod>2026-04-15T10:17:38+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/misc/remote_control_collection_rce</loc>
    <lastmod>2026-04-15T10:17:38+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/misc/remote_mouse_rce</loc>
    <lastmod>2026-04-15T10:17:38+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/misc/solarwinds_amqp_deserialization</loc>
    <lastmod>2026-04-15T10:17:38+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/misc/tiny_identd_overflow</loc>
    <lastmod>2026-04-15T10:17:38+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/misc/unified_remote_rce</loc>
    <lastmod>2026-04-15T10:17:38+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/misc/veeam_one_agent_deserialization</loc>
    <lastmod>2026-04-15T10:17:38+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/misc/webdav_delivery</loc>
    <lastmod>2026-04-15T10:17:38+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/misc/wifi_mouse_rce</loc>
    <lastmod>2026-04-15T10:17:38+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/mssql/mssql_clr_payload</loc>
    <lastmod>2026-04-15T10:17:38+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/nimsoft/nimcontroller_bof</loc>
    <lastmod>2026-04-15T10:17:38+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/nuuo/nuuo_cms_fu</loc>
    <lastmod>2026-04-15T10:17:38+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/nuuo/nuuo_cms_sqli</loc>
    <lastmod>2026-04-15T10:17:38+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/persistence/accessibility_features_debugger</loc>
    <lastmod>2026-04-15T10:17:38+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/persistence/assistive_technology</loc>
    <lastmod>2026-04-15T10:17:38+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/persistence/image_exec_options</loc>
    <lastmod>2026-04-15T10:17:38+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/persistence/linqpad_deserialization</loc>
    <lastmod>2026-04-15T10:17:38+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/persistence/notepadpp_plugin</loc>
    <lastmod>2026-04-15T10:17:38+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/persistence/registry</loc>
    <lastmod>2026-04-15T10:17:38+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/persistence/registry_active_setup</loc>
    <lastmod>2026-04-15T10:17:38+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/persistence/registry_userinit</loc>
    <lastmod>2026-04-15T10:17:38+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/persistence/service</loc>
    <lastmod>2026-04-15T10:17:38+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/persistence/service_for_user/event</loc>
    <lastmod>2026-04-15T10:17:38+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/persistence/service_for_user/lock_unlock</loc>
    <lastmod>2026-04-15T10:17:38+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/persistence/service_for_user/logon</loc>
    <lastmod>2026-04-15T10:17:38+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/persistence/service_for_user/schedule</loc>
    <lastmod>2026-04-15T10:17:38+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/persistence/startup_folder</loc>
    <lastmod>2026-04-15T10:17:38+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/persistence/task_scheduler</loc>
    <lastmod>2026-04-15T10:17:38+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/persistence/telemetry</loc>
    <lastmod>2026-04-15T10:17:38+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/persistence/userinit_mpr_logon_script</loc>
    <lastmod>2026-04-15T10:17:38+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/persistence/wmi/wmi_event_subscription_event_log</loc>
    <lastmod>2026-04-15T10:17:38+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/persistence/wmi/wmi_event_subscription_interval</loc>
    <lastmod>2026-04-15T10:17:38+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/persistence/wmi/wmi_event_subscription_process</loc>
    <lastmod>2026-04-15T10:17:38+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/persistence/wmi/wmi_event_subscription_uptime</loc>
    <lastmod>2026-04-15T10:17:38+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/persistence/wsl/registry</loc>
    <lastmod>2026-04-15T10:17:38+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/rdp/cve_2019_0708_bluekeep_rce</loc>
    <lastmod>2026-04-15T10:17:38+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/rdp/rdp_doublepulsar_rce</loc>
    <lastmod>2026-04-15T10:17:38+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/sage/x3_adxsrv_auth_bypass_cmd_exec</loc>
    <lastmod>2026-04-15T10:17:38+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/scada/advantech_webaccess_dashboard_file_upload</loc>
    <lastmod>2026-04-15T10:17:38+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/scada/advantech_webaccess_webvrpcs_bof</loc>
    <lastmod>2026-04-15T10:17:38+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/scada/delta_ia_commgr_bof</loc>
    <lastmod>2026-04-15T10:17:38+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/scada/diaenergie_sqli</loc>
    <lastmod>2026-04-15T10:17:38+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/scada/mypro_cmdexe</loc>
    <lastmod>2026-04-15T10:17:38+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/scada/mypro_mgr_cmd</loc>
    <lastmod>2026-04-15T10:17:38+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/scada/rockwell_factorytalk_rce</loc>
    <lastmod>2026-04-15T10:17:38+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/smb/cve_2020_0796_smbghost</loc>
    <lastmod>2026-04-15T10:17:38+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/smb/group_policy_startup</loc>
    <lastmod>2026-04-15T10:17:38+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/smb/ms04_007_killbill</loc>
    <lastmod>2026-04-15T10:17:38+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/smb/ms06_040_netapi</loc>
    <lastmod>2026-04-15T10:17:38+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/smb/ms08_067_netapi</loc>
    <lastmod>2026-04-15T10:17:38+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/smb/ms17_010_eternalblue</loc>
    <lastmod>2026-04-15T10:17:38+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/smb/ms17_010_psexec</loc>
    <lastmod>2026-04-15T10:17:38+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/smb/psexec</loc>
    <lastmod>2026-04-15T10:17:38+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/smb/smb_doublepulsar_rce</loc>
    <lastmod>2026-04-15T10:17:38+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/smb/smb_relay</loc>
    <lastmod>2026-04-15T10:17:38+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/smb/smb_rras_erraticgopher</loc>
    <lastmod>2026-04-15T10:17:38+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/smb/smb_shadow</loc>
    <lastmod>2026-04-15T10:17:38+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/smb/webexec</loc>
    <lastmod>2026-04-15T10:17:38+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/smtp/sysgauge_client_bof</loc>
    <lastmod>2026-04-15T10:17:38+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/ssh/freesshd_authbypass</loc>
    <lastmod>2026-04-15T10:17:38+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/tftp/distinct_tftp_traversal</loc>
    <lastmod>2026-04-15T10:17:38+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/exploit/windows/winrm/winrm_script_exec</loc>
    <lastmod>2026-04-15T10:17:38+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/module_doc_template</loc>
    <lastmod>2026-04-15T10:17:38+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/payload/android/meterpreter/injection</loc>
    <lastmod>2026-04-15T10:17:38+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/payload/android/meterpreter/reverse_tcp</loc>
    <lastmod>2026-04-15T10:17:38+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/payload/cmd/unix/bind_busybox_telnetd</loc>
    <lastmod>2026-04-15T10:17:38+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/payload/linux/x86/meterpreter/reverse_tcp</loc>
    <lastmod>2026-04-15T10:17:38+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/payload/osx/x64/meterpreter/reverse_tcp</loc>
    <lastmod>2026-04-15T10:17:38+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/payload/php/meterpreter/reverse_tcp</loc>
    <lastmod>2026-04-15T10:17:38+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/payload/python/meterpreter/reverse_tcp</loc>
    <lastmod>2026-04-15T10:17:38+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/payload/singles/cmd/windows/powershell_reverse_tcp</loc>
    <lastmod>2026-04-15T10:17:38+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/payload/singles/cmd/windows/powershell_reverse_tcp_ssl</loc>
    <lastmod>2026-04-15T10:17:38+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/payload/windows/meterpreter/reverse_https</loc>
    <lastmod>2026-04-15T10:17:38+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/payload/windows/meterpreter/reverse_tcp</loc>
    <lastmod>2026-04-15T10:17:38+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/payload/windows/shell/reverse_ord_tcp</loc>
    <lastmod>2026-04-15T10:17:38+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/android/capture/screen</loc>
    <lastmod>2026-04-15T10:17:38+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/android/gather/hashdump</loc>
    <lastmod>2026-04-15T10:17:38+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/android/gather/sub_info</loc>
    <lastmod>2026-04-15T10:17:38+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/android/gather/wireless_ap</loc>
    <lastmod>2026-04-15T10:17:38+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/android/local/koffee</loc>
    <lastmod>2026-04-15T10:17:38+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/android/manage/remove_lock_root</loc>
    <lastmod>2026-04-15T10:17:38+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/apple_ios/gather/ios_image_gather</loc>
    <lastmod>2026-04-15T10:17:38+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/apple_ios/gather/ios_text_gather</loc>
    <lastmod>2026-04-15T10:17:38+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/bsd/gather/hashdump</loc>
    <lastmod>2026-04-15T10:17:38+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/firefox/gather/passwords</loc>
    <lastmod>2026-04-15T10:17:38+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/hardware/automotive/can_flood</loc>
    <lastmod>2026-04-15T10:17:38+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/hardware/automotive/canprobe</loc>
    <lastmod>2026-04-15T10:17:38+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/hardware/automotive/diagnostic_state</loc>
    <lastmod>2026-04-15T10:17:38+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/hardware/automotive/ecu_hard_reset</loc>
    <lastmod>2026-04-15T10:17:38+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/hardware/automotive/getvinfo</loc>
    <lastmod>2026-04-15T10:17:38+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/hardware/automotive/identifymodules</loc>
    <lastmod>2026-04-15T10:17:38+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/hardware/automotive/mazda_ic_mover</loc>
    <lastmod>2026-04-15T10:17:38+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/hardware/automotive/pdt</loc>
    <lastmod>2026-04-15T10:17:38+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/hardware/rftransceiver/rfpwnon</loc>
    <lastmod>2026-04-15T10:17:38+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/hardware/rftransceiver/transmitter</loc>
    <lastmod>2026-04-15T10:17:38+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/hardware/zigbee/zstumbler</loc>
    <lastmod>2026-04-15T10:17:38+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/linux/capture/grandstream_gxp1600_sip</loc>
    <lastmod>2026-04-15T10:17:38+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/linux/dos/xen_420_dos</loc>
    <lastmod>2026-04-15T10:17:38+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/linux/gather/ansible</loc>
    <lastmod>2026-04-15T10:17:38+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/linux/gather/ansible_playbook_error_message_file_reader</loc>
    <lastmod>2026-04-15T10:17:38+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/linux/gather/apache_nifi_credentials</loc>
    <lastmod>2026-04-15T10:17:38+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/linux/gather/checkcontainer</loc>
    <lastmod>2026-04-15T10:17:38+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/linux/gather/checkvm</loc>
    <lastmod>2026-04-15T10:17:38+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/linux/gather/enum_commands</loc>
    <lastmod>2026-04-15T10:17:38+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/linux/gather/enum_containers</loc>
    <lastmod>2026-04-15T10:17:38+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/linux/gather/enum_nagios_xi</loc>
    <lastmod>2026-04-15T10:17:38+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/linux/gather/enum_protections</loc>
    <lastmod>2026-04-15T10:17:38+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/linux/gather/enum_psk</loc>
    <lastmod>2026-04-15T10:17:38+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/linux/gather/f5_loot_mcp</loc>
    <lastmod>2026-04-15T10:17:38+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/linux/gather/grandstream_gxp1600_creds</loc>
    <lastmod>2026-04-15T10:17:38+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/linux/gather/haserl_read</loc>
    <lastmod>2026-04-15T10:17:38+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/linux/gather/hashdump</loc>
    <lastmod>2026-04-15T10:17:39+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/linux/gather/igel_dump_file</loc>
    <lastmod>2026-04-15T10:17:39+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/linux/gather/manageengine_password_manager_creds</loc>
    <lastmod>2026-04-15T10:17:39+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/linux/gather/mimipenguin</loc>
    <lastmod>2026-04-15T10:17:39+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/linux/gather/phpmyadmin_credsteal</loc>
    <lastmod>2026-04-15T10:17:39+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/linux/gather/puppet</loc>
    <lastmod>2026-04-15T10:17:39+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/linux/gather/rancher_audit_log_leak</loc>
    <lastmod>2026-04-15T10:17:39+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/linux/gather/vcenter_secrets_dump</loc>
    <lastmod>2026-04-15T10:17:39+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/linux/manage/adduser</loc>
    <lastmod>2026-04-15T10:17:39+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/linux/manage/disable_clamav</loc>
    <lastmod>2026-04-15T10:17:39+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/linux/manage/geutebruck_post_exp</loc>
    <lastmod>2026-04-15T10:17:39+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/multi/escalate/aws_create_iam_user</loc>
    <lastmod>2026-04-15T10:17:39+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/multi/gather/aws_ec2_instance_metadata</loc>
    <lastmod>2026-04-15T10:17:39+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/multi/gather/aws_keys</loc>
    <lastmod>2026-04-15T10:17:39+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/multi/gather/azure_cli_creds</loc>
    <lastmod>2026-04-15T10:17:39+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/multi/gather/chrome_cookies</loc>
    <lastmod>2026-04-15T10:17:39+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/multi/gather/dbeaver</loc>
    <lastmod>2026-04-15T10:17:39+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/multi/gather/electerm</loc>
    <lastmod>2026-04-15T10:17:39+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/multi/gather/enum_hexchat</loc>
    <lastmod>2026-04-15T10:17:39+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/multi/gather/enum_software_versions</loc>
    <lastmod>2026-04-15T10:17:39+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/multi/gather/env</loc>
    <lastmod>2026-04-15T10:17:39+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/multi/gather/fetchmailrc_creds</loc>
    <lastmod>2026-04-15T10:17:39+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/multi/gather/grub_creds</loc>
    <lastmod>2026-04-15T10:17:39+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/multi/gather/irssi_creds</loc>
    <lastmod>2026-04-15T10:17:39+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/multi/gather/jboss_gather</loc>
    <lastmod>2026-04-15T10:17:39+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/multi/gather/jenkins_gather</loc>
    <lastmod>2026-04-15T10:17:39+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/multi/gather/maven_creds</loc>
    <lastmod>2026-04-15T10:17:39+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/multi/gather/memory_search</loc>
    <lastmod>2026-04-15T10:17:39+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/multi/gather/minio_client</loc>
    <lastmod>2026-04-15T10:17:39+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/multi/gather/netrc_creds</loc>
    <lastmod>2026-04-15T10:17:39+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/multi/gather/saltstack_salt</loc>
    <lastmod>2026-04-15T10:17:39+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/multi/gather/tomcat_gather</loc>
    <lastmod>2026-04-15T10:17:39+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/multi/gather/ubiquiti_unifi_backup</loc>
    <lastmod>2026-04-15T10:17:39+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/multi/gather/unix_cached_ad_hashes</loc>
    <lastmod>2026-04-15T10:17:39+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/multi/gather/unix_kerberos_tickets</loc>
    <lastmod>2026-04-15T10:17:39+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/multi/gather/wlan_geolocate</loc>
    <lastmod>2026-04-15T10:17:39+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/multi/gather/wowza_streaming_engine_creds</loc>
    <lastmod>2026-04-15T10:17:39+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/multi/manage/autoroute</loc>
    <lastmod>2026-04-15T10:17:39+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/multi/manage/fileshare</loc>
    <lastmod>2026-04-15T10:17:39+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/multi/manage/hsts_eraser</loc>
    <lastmod>2026-04-15T10:17:39+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/multi/manage/open</loc>
    <lastmod>2026-04-15T10:17:39+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/multi/manage/play_youtube</loc>
    <lastmod>2026-04-15T10:17:39+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/multi/manage/screensaver</loc>
    <lastmod>2026-04-15T10:17:39+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/multi/manage/screenshare</loc>
    <lastmod>2026-04-15T10:17:39+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/multi/manage/shell_to_meterpreter</loc>
    <lastmod>2026-04-15T10:17:39+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/multi/manage/upload_exec</loc>
    <lastmod>2026-04-15T10:17:39+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/multi/recon/local_exploit_suggester</loc>
    <lastmod>2026-04-15T10:17:39+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/multi/recon/multiport_egress_traffic</loc>
    <lastmod>2026-04-15T10:17:39+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/multi/recon/persistence_suggester</loc>
    <lastmod>2026-04-15T10:17:39+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/multi/recon/reverse_lookup</loc>
    <lastmod>2026-04-15T10:17:39+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/multi/recon/sudo_commands</loc>
    <lastmod>2026-04-15T10:17:39+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/multi/sap/smdagent_get_properties</loc>
    <lastmod>2026-04-15T10:17:39+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/networking/gather/enum_brocade</loc>
    <lastmod>2026-04-15T10:17:39+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/networking/gather/enum_cisco</loc>
    <lastmod>2026-04-15T10:17:39+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/networking/gather/enum_f5</loc>
    <lastmod>2026-04-15T10:17:39+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/networking/gather/enum_juniper</loc>
    <lastmod>2026-04-15T10:17:39+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/networking/gather/enum_mikrotik</loc>
    <lastmod>2026-04-15T10:17:39+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/networking/gather/enum_vyos</loc>
    <lastmod>2026-04-15T10:17:39+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/osx/admin/say</loc>
    <lastmod>2026-04-15T10:17:39+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/osx/capture/screen</loc>
    <lastmod>2026-04-15T10:17:39+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/osx/escalate/tccbypass</loc>
    <lastmod>2026-04-15T10:17:39+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/osx/gather/apfs_encrypted_volume_passwd</loc>
    <lastmod>2026-04-15T10:17:39+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/osx/gather/enum_osx</loc>
    <lastmod>2026-04-15T10:17:39+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/osx/gather/gitignore</loc>
    <lastmod>2026-04-15T10:17:39+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/osx/gather/hashdump</loc>
    <lastmod>2026-04-15T10:17:39+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/osx/gather/password_prompt_spoof</loc>
    <lastmod>2026-04-15T10:17:39+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/osx/gather/vnc_password_osx</loc>
    <lastmod>2026-04-15T10:17:39+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/osx/manage/sonic_pi</loc>
    <lastmod>2026-04-15T10:17:39+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/solaris/escalate/pfexec</loc>
    <lastmod>2026-04-15T10:17:39+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/solaris/escalate/srsexec_readline</loc>
    <lastmod>2026-04-15T10:17:39+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/windows/capture/keylog_recorder</loc>
    <lastmod>2026-04-15T10:17:39+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/windows/escalate/getsystem</loc>
    <lastmod>2026-04-15T10:17:39+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/windows/escalate/unmarshal_cmd_exec</loc>
    <lastmod>2026-04-15T10:17:39+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/windows/gather/ad_to_sqlite</loc>
    <lastmod>2026-04-15T10:17:39+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/windows/gather/arp_scanner</loc>
    <lastmod>2026-04-15T10:17:39+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/windows/gather/avast_memory_dump</loc>
    <lastmod>2026-04-15T10:17:39+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/windows/gather/bitlocker_fvek</loc>
    <lastmod>2026-04-15T10:17:39+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/windows/gather/bloodhound</loc>
    <lastmod>2026-04-15T10:17:39+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/windows/gather/cachedump</loc>
    <lastmod>2026-04-15T10:17:39+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/windows/gather/checkvm</loc>
    <lastmod>2026-04-15T10:17:39+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/windows/gather/credentials/adi_irc</loc>
    <lastmod>2026-04-15T10:17:39+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/windows/gather/credentials/aim</loc>
    <lastmod>2026-04-15T10:17:39+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/windows/gather/credentials/avira_password</loc>
    <lastmod>2026-04-15T10:17:39+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/windows/gather/credentials/carotdav_ftp</loc>
    <lastmod>2026-04-15T10:17:39+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/windows/gather/credentials/chrome</loc>
    <lastmod>2026-04-15T10:17:39+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/windows/gather/credentials/comodo</loc>
    <lastmod>2026-04-15T10:17:39+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/windows/gather/credentials/coolnovo</loc>
    <lastmod>2026-04-15T10:17:39+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/windows/gather/credentials/digsby</loc>
    <lastmod>2026-04-15T10:17:39+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/windows/gather/credentials/dynazip_log</loc>
    <lastmod>2026-04-15T10:17:39+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/windows/gather/credentials/flock</loc>
    <lastmod>2026-04-15T10:17:39+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/windows/gather/credentials/gadugadu</loc>
    <lastmod>2026-04-15T10:17:39+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/windows/gather/credentials/halloy_irc</loc>
    <lastmod>2026-04-15T10:17:39+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/windows/gather/credentials/icq</loc>
    <lastmod>2026-04-15T10:17:39+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/windows/gather/credentials/ie</loc>
    <lastmod>2026-04-15T10:17:39+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/windows/gather/credentials/incredimail</loc>
    <lastmod>2026-04-15T10:17:39+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/windows/gather/credentials/kakaotalk</loc>
    <lastmod>2026-04-15T10:17:39+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/windows/gather/credentials/kmeleon</loc>
    <lastmod>2026-04-15T10:17:39+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/windows/gather/credentials/line</loc>
    <lastmod>2026-04-15T10:17:39+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/windows/gather/credentials/maxthon</loc>
    <lastmod>2026-04-15T10:17:39+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/windows/gather/credentials/mdaemon_cred_collector</loc>
    <lastmod>2026-04-15T10:17:39+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/windows/gather/credentials/miranda</loc>
    <lastmod>2026-04-15T10:17:39+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/windows/gather/credentials/moba_xterm</loc>
    <lastmod>2026-04-15T10:17:39+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/windows/gather/credentials/navicat</loc>
    <lastmod>2026-04-15T10:17:39+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/windows/gather/credentials/opera</loc>
    <lastmod>2026-04-15T10:17:39+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/windows/gather/credentials/operamail</loc>
    <lastmod>2026-04-15T10:17:39+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/windows/gather/credentials/plsql_developer</loc>
    <lastmod>2026-04-15T10:17:39+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/windows/gather/credentials/postbox</loc>
    <lastmod>2026-04-15T10:17:39+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/windows/gather/credentials/pulse_secure</loc>
    <lastmod>2026-04-15T10:17:39+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/windows/gather/credentials/purevpn_cred_collector</loc>
    <lastmod>2026-04-15T10:17:39+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/windows/gather/credentials/qq</loc>
    <lastmod>2026-04-15T10:17:39+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/windows/gather/credentials/quassel_irc</loc>
    <lastmod>2026-04-15T10:17:39+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/windows/gather/credentials/redis_desktop_manager</loc>
    <lastmod>2026-04-15T10:17:39+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/windows/gather/credentials/safari</loc>
    <lastmod>2026-04-15T10:17:39+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/windows/gather/credentials/seamonkey</loc>
    <lastmod>2026-04-15T10:17:39+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/windows/gather/credentials/securecrt</loc>
    <lastmod>2026-04-15T10:17:39+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/windows/gather/credentials/solarwinds_orion_dump</loc>
    <lastmod>2026-04-15T10:17:39+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/windows/gather/credentials/srware</loc>
    <lastmod>2026-04-15T10:17:39+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/windows/gather/credentials/sylpheed</loc>
    <lastmod>2026-04-15T10:17:39+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/windows/gather/credentials/tango</loc>
    <lastmod>2026-04-15T10:17:39+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/windows/gather/credentials/teamviewer_passwords</loc>
    <lastmod>2026-04-15T10:17:39+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/windows/gather/credentials/thunderbird</loc>
    <lastmod>2026-04-15T10:17:39+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/windows/gather/credentials/thycotic_secretserver_dump</loc>
    <lastmod>2026-04-15T10:17:39+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/windows/gather/credentials/tlen</loc>
    <lastmod>2026-04-15T10:17:39+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/windows/gather/credentials/veeam_credential_dump</loc>
    <lastmod>2026-04-15T10:17:39+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/windows/gather/credentials/viber</loc>
    <lastmod>2026-04-15T10:17:39+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/windows/gather/credentials/whatsupgold_credential_dump</loc>
    <lastmod>2026-04-15T10:17:39+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/windows/gather/credentials/winbox_settings</loc>
    <lastmod>2026-04-15T10:17:39+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/windows/gather/credentials/windows_autologin</loc>
    <lastmod>2026-04-15T10:17:39+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/windows/gather/credentials/windows_sam_hivenightmare</loc>
    <lastmod>2026-04-15T10:17:39+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/windows/gather/credentials/windowslivemail</loc>
    <lastmod>2026-04-15T10:17:39+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/windows/gather/credentials/xchat</loc>
    <lastmod>2026-04-15T10:17:39+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/windows/gather/credentials/xshell_xftp_password</loc>
    <lastmod>2026-04-15T10:17:39+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/windows/gather/dnscache_dump</loc>
    <lastmod>2026-04-15T10:17:39+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/windows/gather/dumplinks</loc>
    <lastmod>2026-04-15T10:17:39+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/windows/gather/enum_ad_groups</loc>
    <lastmod>2026-04-15T10:17:39+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/windows/gather/enum_applications</loc>
    <lastmod>2026-04-15T10:17:39+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/windows/gather/enum_artifacts</loc>
    <lastmod>2026-04-15T10:17:39+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/windows/gather/enum_av</loc>
    <lastmod>2026-04-15T10:17:39+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/windows/gather/enum_browsers</loc>
    <lastmod>2026-04-15T10:17:39+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/windows/gather/enum_chocolatey_applications</loc>
    <lastmod>2026-04-15T10:17:39+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/windows/gather/enum_chrome</loc>
    <lastmod>2026-04-15T10:17:39+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/windows/gather/enum_devices</loc>
    <lastmod>2026-04-15T10:17:39+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/windows/gather/enum_domain</loc>
    <lastmod>2026-04-15T10:17:39+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/windows/gather/enum_domain_group_users</loc>
    <lastmod>2026-04-15T10:17:39+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/windows/gather/enum_domain_tokens</loc>
    <lastmod>2026-04-15T10:17:39+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/windows/gather/enum_hostfile</loc>
    <lastmod>2026-04-15T10:17:39+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/windows/gather/enum_hyperv_vms</loc>
    <lastmod>2026-04-15T10:17:39+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/windows/gather/enum_ie</loc>
    <lastmod>2026-04-15T10:17:39+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/windows/gather/enum_logged_on_users</loc>
    <lastmod>2026-04-15T10:17:39+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/windows/gather/enum_ms_product_keys</loc>
    <lastmod>2026-04-15T10:17:39+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/windows/gather/enum_onedrive</loc>
    <lastmod>2026-04-15T10:17:39+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/windows/gather/enum_patches</loc>
    <lastmod>2026-04-15T10:17:39+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/windows/gather/enum_powershell_env</loc>
    <lastmod>2026-04-15T10:17:39+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/windows/gather/enum_proxy</loc>
    <lastmod>2026-04-15T10:17:39+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/windows/gather/enum_services</loc>
    <lastmod>2026-04-15T10:17:39+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/windows/gather/enum_shares</loc>
    <lastmod>2026-04-15T10:17:40+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/windows/gather/enum_snmp</loc>
    <lastmod>2026-04-15T10:17:40+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/windows/gather/enum_tokens</loc>
    <lastmod>2026-04-15T10:17:40+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/windows/gather/exchange</loc>
    <lastmod>2026-04-15T10:17:40+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/windows/gather/forensics/fanny_bmp_check</loc>
    <lastmod>2026-04-15T10:17:40+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/windows/gather/get_bookmarks</loc>
    <lastmod>2026-04-15T10:17:40+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/windows/gather/hashdump</loc>
    <lastmod>2026-04-15T10:17:40+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/windows/gather/lsa_secrets</loc>
    <lastmod>2026-04-15T10:17:40+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/windows/gather/make_csv_orgchart</loc>
    <lastmod>2026-04-15T10:17:40+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/windows/gather/memory_dump</loc>
    <lastmod>2026-04-15T10:17:40+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/windows/gather/netlm_downgrade</loc>
    <lastmod>2026-04-15T10:17:40+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/windows/gather/ntds_grabber</loc>
    <lastmod>2026-04-15T10:17:40+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/windows/gather/phish_windows_credentials</loc>
    <lastmod>2026-04-15T10:17:40+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/windows/gather/psreadline_history</loc>
    <lastmod>2026-04-15T10:17:40+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/windows/gather/resolve_sid</loc>
    <lastmod>2026-04-15T10:17:40+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/windows/gather/screen_spy</loc>
    <lastmod>2026-04-15T10:17:40+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/windows/gather/smart_hashdump</loc>
    <lastmod>2026-04-15T10:17:40+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/windows/gather/tcpnetstat</loc>
    <lastmod>2026-04-15T10:17:40+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/windows/gather/wmic_command</loc>
    <lastmod>2026-04-15T10:17:40+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/windows/manage/archmigrate</loc>
    <lastmod>2026-04-15T10:17:40+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/windows/manage/dell_memory_protect</loc>
    <lastmod>2026-04-15T10:17:40+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/windows/manage/execute_dotnet_assembly</loc>
    <lastmod>2026-04-15T10:17:40+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/windows/manage/forward_pageant</loc>
    <lastmod>2026-04-15T10:17:40+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/windows/manage/hashcarve</loc>
    <lastmod>2026-04-15T10:17:40+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/windows/manage/install_python</loc>
    <lastmod>2026-04-15T10:17:40+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/windows/manage/install_ssh</loc>
    <lastmod>2026-04-15T10:17:40+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/windows/manage/kerberos_tickets</loc>
    <lastmod>2026-04-15T10:17:40+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/windows/manage/killav</loc>
    <lastmod>2026-04-15T10:17:40+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/windows/manage/make_token</loc>
    <lastmod>2026-04-15T10:17:40+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/windows/manage/mssql_local_auth_bypass</loc>
    <lastmod>2026-04-15T10:17:40+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/windows/manage/peinjector</loc>
    <lastmod>2026-04-15T10:17:40+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/windows/manage/powershell/build_net_code</loc>
    <lastmod>2026-04-15T10:17:40+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/windows/manage/priv_migrate</loc>
    <lastmod>2026-04-15T10:17:40+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/windows/manage/rid_hijack</loc>
    <lastmod>2026-04-15T10:17:40+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/windows/manage/rollback_defender_signatures</loc>
    <lastmod>2026-04-15T10:17:40+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/windows/manage/run_as_psh</loc>
    <lastmod>2026-04-15T10:17:40+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/windows/manage/vss</loc>
    <lastmod>2026-04-15T10:17:40+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/documentation/modules/post/windows/wlan/wlan_probe_request</loc>
    <lastmod>2026-04-15T10:17:40+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/external/README</loc>
    <lastmod>2026-04-15T10:17:40+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/external/source/exploits/CVE-2013-6282/Readme</loc>
    <lastmod>2026-04-15T10:17:40+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/external/source/exploits/CVE-2015-2426/Readme</loc>
    <lastmod>2026-04-15T10:17:40+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/external/source/exploits/CVE-2019-1458/README</loc>
    <lastmod>2026-04-15T10:17:40+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/external/source/exploits/CVE-2019-2215/README</loc>
    <lastmod>2026-04-15T10:17:40+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/external/source/exploits/CVE-2020-9850/README</loc>
    <lastmod>2026-04-15T10:17:40+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/external/source/exploits/CVE-2021-22555/README</loc>
    <lastmod>2026-04-15T10:17:40+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/external/source/exploits/CVE-2021-3490/Linux_LPE_eBPF_CVE-2021-3490/README</loc>
    <lastmod>2026-04-15T10:17:40+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/external/source/exploits/CVE-2022-1471/README</loc>
    <lastmod>2026-04-15T10:17:40+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/external/source/exploits/CVE-2022-34918/README</loc>
    <lastmod>2026-04-15T10:17:40+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/external/source/exploits/CVE-2022-46689/README</loc>
    <lastmod>2026-04-15T10:17:40+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/external/source/exploits/IE11SandboxEscapes/README</loc>
    <lastmod>2026-04-15T10:17:40+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/external/source/exploits/cve-2015-0016/Readme</loc>
    <lastmod>2026-04-15T10:17:40+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/external/source/exploits/cve-2018-8897/dll/Readme</loc>
    <lastmod>2026-04-15T10:17:40+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/external/source/exploits/cve-2018-8897/exe/README</loc>
    <lastmod>2026-04-15T10:17:40+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/external/source/flash_detector/bin/index</loc>
    <lastmod>2026-04-15T10:17:40+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/external/source/include/windows/README</loc>
    <lastmod>2026-04-15T10:17:40+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/external/source/rdll_template/README</loc>
    <lastmod>2026-04-15T10:17:40+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/external/source/tightvnc/index</loc>
    <lastmod>2026-04-15T10:17:40+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/external/source/vncdll/winvnc/zlib/zlib</loc>
    <lastmod>2026-04-15T10:17:40+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/external/zsh/README</loc>
    <lastmod>2026-04-15T10:17:40+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/kubernetes/README</loc>
    <lastmod>2026-04-15T10:17:40+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/lib/README</loc>
    <lastmod>2026-04-15T10:17:40+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/lib/msf/base/README</loc>
    <lastmod>2026-04-15T10:17:40+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/lib/msf/core/README</loc>
    <lastmod>2026-04-15T10:17:40+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/lib/rex/proto/kerberos/README</loc>
    <lastmod>2026-04-15T10:17:40+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/modules/README</loc>
    <lastmod>2026-04-15T10:17:40+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/plugins/README</loc>
    <lastmod>2026-04-15T10:17:40+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/script/README</loc>
    <lastmod>2026-04-15T10:17:40+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/scripts/README</loc>
    <lastmod>2026-04-15T10:17:40+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/tools/README</loc>
    <lastmod>2026-04-15T10:17:40+07:00</lastmod>
  </url>
  <url>
    <loc>https://contextqmd.com/libraries/metasploit-framework/versions/6.4.127/pages/tools/hardware/README</loc>
    <lastmod>2026-04-15T10:17:40+07:00</lastmod>
  </url>
</urlset>
