<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>War Room</title>
	<atom:link href="https://warroom.rsmus.com/author/steiner/feed/" rel="self" type="application/rss+xml" />
	<link>https://warroom.rsmus.com</link>
	<description>Shells From Above</description>
	<lastBuildDate>Thu, 15 Feb 2024 19:23:34 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://warroom.rsmus.com/wp-content/uploads/2018/09/cropped-favicon-32x32.png</url>
	<title>War Room</title>
	<link>https://warroom.rsmus.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Crimson Forge</title>
		<link>https://warroom.rsmus.com/crimson-forge/</link>
		
		<dc:creator><![CDATA[Spencer]]></dc:creator>
		<pubDate>Thu, 12 Dec 2019 20:05:17 +0000</pubDate>
				<category><![CDATA[Development]]></category>
		<category><![CDATA[Metasploit]]></category>
		<category><![CDATA[Tools]]></category>
		<guid isPermaLink="false">https://warroom.rsmus.com/?p=4968</guid>

					<description><![CDATA[Today RSM US has released a new research project dubbed Crimson Forge. The project originated from the desire to add evasion capabilities to existing, native payloads. The intention is to target x86 and AMD64 shellcode and automatically rewrite it to evade signature based detections. The issue with many existing implementations are that they rely on [&#8230;]]]></description>
		
		
		
			</item>
		<item>
		<title>GTP Scanning</title>
		<link>https://warroom.rsmus.com/gtp-scanning/</link>
		
		<dc:creator><![CDATA[Spencer]]></dc:creator>
		<pubDate>Tue, 07 May 2019 17:48:13 +0000</pubDate>
				<category><![CDATA[Development]]></category>
		<category><![CDATA[Metasploit]]></category>
		<guid isPermaLink="false">https://warroom.rsmus.com/?p=4858</guid>

					<description><![CDATA[A while ago I was working on an assessment where I was exposed to General Packet Radio Service (GPRS) servers. Having not been familiar with this particular technology, I started to read about the details of the protocol and it&#8217;s implementation. One of the best resources I found was the presentation &#8220;Practical security research on [&#8230;]]]></description>
		
		
		
			</item>
		<item>
		<title>King Phisher Release 1.10</title>
		<link>https://warroom.rsmus.com/king-phisher-release-1-10/</link>
		
		<dc:creator><![CDATA[Spencer]]></dc:creator>
		<pubDate>Fri, 16 Mar 2018 20:00:15 +0000</pubDate>
				<category><![CDATA[Development]]></category>
		<category><![CDATA[King Phisher]]></category>
		<category><![CDATA[Phishing]]></category>
		<category><![CDATA[Phishing Campaign Toolkit]]></category>
		<category><![CDATA[Tools]]></category>
		<guid isPermaLink="false">https://warroom.rsmus.com/?p=4569</guid>

					<description><![CDATA[Today we&#8217;re proud to announce the next release of King Phisher, version 1.10. This release saw extensive changes under the hood to improve the long term experience. One of the notable changes that users will directly benefit from are multiple tweaks to the email messages sent by King Phisher resulting in lower scores when rated [&#8230;]]]></description>
		
		
		
			</item>
		<item>
		<title>Termineter 1.0</title>
		<link>https://warroom.rsmus.com/termineter-v1/</link>
		
		<dc:creator><![CDATA[Spencer]]></dc:creator>
		<pubDate>Thu, 18 Jan 2018 13:44:18 +0000</pubDate>
				<category><![CDATA[Development]]></category>
		<category><![CDATA[Python]]></category>
		<category><![CDATA[Smart Meter]]></category>
		<category><![CDATA[Termineter]]></category>
		<guid isPermaLink="false">https://warroom.rsmus.com/?p=4485</guid>

					<description><![CDATA[Termineter Version 1: Come With Me If You Want To Pwn&#8230; Almost six years after its initial release, RSM has published version 1.0 (and shortly thereafter a couple of bug fixes) of its Open Source Smart Meter Penetration Testing Framework dubbed &#8220;Termineter&#8221;. The framework has been an integral part of the Smart Meter assessment portion [&#8230;]]]></description>
		
		
		
			</item>
	</channel>
</rss>
