<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="wordpress.com" -->
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd"><url><loc>https://douglasmendes.code.blog/2020/08/09/analise-de-memoria-pt-2-analise-forense/</loc><image:image><image:loc>https://douglasmendes.code.blog/wp-content/uploads/2020/08/memoria-2-imagem-6-2.jpg</image:loc><image:title>Memória 2 - Imagem 6</image:title></image:image><image:image><image:loc>https://douglasmendes.code.blog/wp-content/uploads/2020/08/memoria-2-imagem-8-1.jpg</image:loc><image:title>Memória 2 - Imagem 8</image:title></image:image><image:image><image:loc>https://douglasmendes.code.blog/wp-content/uploads/2020/08/memoria-2-imagem-6-1.jpg</image:loc><image:title>Memória 2 - Imagem 6</image:title></image:image><lastmod>2021-11-08T18:20:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://douglasmendes.code.blog/2021/01/02/como-atacar-servidor-web-sql-injection-pt-1-pentesting/</loc><image:image><image:loc>https://douglasmendes.code.blog/wp-content/uploads/2021/01/sql-injection-imagem-49-1.jpg</image:loc><image:title>SQL Injection - Imagem 49</image:title></image:image><image:image><image:loc>https://douglasmendes.code.blog/wp-content/uploads/2021/01/sql-injection-imagem-44.jpg</image:loc><image:title>SQL Injection - Imagem 44</image:title></image:image><image:image><image:loc>https://douglasmendes.code.blog/wp-content/uploads/2021/01/sql-injection-imagem-23.jpg</image:loc><image:title>SQL Injection - Imagem 23</image:title></image:image><lastmod>2021-01-02T15:33:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://douglasmendes.code.blog/2020/12/22/como-montar-um-servidor-web-para-treinar-invasao-pentesting/</loc><image:image><image:loc>https://douglasmendes.code.blog/wp-content/uploads/2020/12/dvwa-imagem-10.jpg</image:loc><image:title>DVWA - Imagem 10</image:title></image:image><lastmod>2020-12-28T12:46:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://douglasmendes.code.blog/2020/07/22/como-conseguir-a-senha-de-uma-rede-wi-fi-utilizando-as-ferramentas-aircrack-ng-crunch-no-kali-linux-wireless-attacks/</loc><lastmod>2020-12-22T12:04:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://douglasmendes.code.blog/2020/12/19/como-fazer-um-relatorio-pt-2-analise-forense/</loc><lastmod>2020-12-19T22:43:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://douglasmendes.code.blog/2020/12/18/como-fazer-um-relatorio-pt-1-analise-forense/</loc><lastmod>2020-12-18T11:25:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://douglasmendes.code.blog/2020/12/17/autopsy-suite-de-ferramentas-forense-pt-3-analise-forense/</loc><lastmod>2020-12-17T12:05:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://douglasmendes.code.blog/2020/12/15/autopsy-suite-de-ferramentas-forense-pt-2-analise-forense/</loc><image:image><image:loc>https://douglasmendes.code.blog/wp-content/uploads/2020/12/autopsy2-imagem-40-1.jpg</image:loc><image:title>Autopsy2 - Imagem 40</image:title></image:image><image:image><image:loc>https://douglasmendes.code.blog/wp-content/uploads/2020/12/autopsy2-imagem-39-1.jpg</image:loc><image:title>Autopsy2 - Imagem 39</image:title></image:image><image:image><image:loc>https://douglasmendes.code.blog/wp-content/uploads/2020/12/autopsy2-imagem-38-2.jpg</image:loc><image:title>Autopsy2 - Imagem 38</image:title></image:image><image:image><image:loc>https://douglasmendes.code.blog/wp-content/uploads/2020/12/autopsy2-imagem-1.jpg</image:loc><image:title>Autopsy2 - Imagem 1</image:title></image:image><lastmod>2020-12-16T01:54:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://douglasmendes.code.blog/2020/12/10/autopsy-suite-de-ferramentas-forense-pt-1-analise-forense/</loc><lastmod>2020-12-10T22:13:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://douglasmendes.code.blog/2020/12/07/gravacao-de-arquivos-e-recuperacao-de-dados-pt-3-analise-forense/</loc><lastmod>2020-12-07T21:20:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://douglasmendes.code.blog/2020/12/01/gravacao-de-arquivos-e-recuperacao-de-dados-pt-2-analise-forense/</loc><lastmod>2020-12-01T22:04:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://douglasmendes.code.blog/2020/11/29/gravacao-de-arquivos-e-recuperacao-de-dados-pt-1-analise-forense/</loc><lastmod>2020-11-29T19:01:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://douglasmendes.code.blog/2020/11/26/como-construir-uma-super-linha-do-tempo-das-atividades-analise-forense/</loc><image:image><image:loc>https://douglasmendes.code.blog/wp-content/uploads/2020/11/super-timeline-imagem-27.jpg</image:loc><image:title>Super Timeline - Imagem 27</image:title></image:image><image:image><image:loc>https://douglasmendes.code.blog/wp-content/uploads/2020/11/super-timeline-imagem-6.jpg</image:loc><image:title>Super Timeline - Imagem 6</image:title></image:image><lastmod>2020-11-26T16:39:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://douglasmendes.code.blog/2020/10/11/analise-de-memoria-pt-4-analise-forense/</loc><lastmod>2020-11-17T22:06:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://douglasmendes.code.blog/2020/05/08/como-extrair-a-imagem-de-um-android-utilizando-a-ferramenta-dc3dd-para-analise-forense/</loc><lastmod>2020-11-17T21:50:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://douglasmendes.code.blog/2020/05/21/analise-de-registros-do-windows-analise-forense/</loc><lastmod>2020-11-16T17:06:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://douglasmendes.code.blog/2020/11/05/analise-forense-em-redes-pt-3-analise-forense/</loc><lastmod>2020-11-16T16:52:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://douglasmendes.code.blog/2020/11/03/analise-forense-em-redes-pt-2-analise-forense/</loc><lastmod>2020-11-06T13:27:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://douglasmendes.code.blog/2020/10/28/analise-forense-em-redes-pt-1-analise-forense/</loc><lastmod>2020-11-06T13:27:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://douglasmendes.code.blog/2020/09/05/analise-de-memoria-pt-3-analise-forense/</loc><lastmod>2020-11-06T13:26:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://douglasmendes.code.blog/2020/08/01/analise-de-memoria-pt-1-analise-forense/</loc><lastmod>2020-11-06T13:25:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://douglasmendes.code.blog/2020/07/28/como-verificar-quem-e-o-dono-de-um-enderecamento-ip-tecnica-footprinting-e-coleta-de-informacoes-pt-2-analise-forense/</loc><lastmod>2020-11-06T13:25:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://douglasmendes.code.blog/2020/07/26/como-verificar-quem-e-o-dono-de-um-enderecamento-ip-tecnica-footprinting-e-coleta-de-informacoes-pt-1-analise-forense/</loc><lastmod>2020-11-06T13:25:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://douglasmendes.code.blog/2020/06/27/ferramentas-de-analise-de-arquivos-analise-forense/</loc><lastmod>2020-11-06T13:23:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://douglasmendes.code.blog/2020/06/22/como-extrair-e-analisar-dados-do-navegador-do-e-mail-e-mensagens-instantaneas-parte-3-analise-forense/</loc><lastmod>2020-11-06T13:22:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://douglasmendes.code.blog/2020/06/19/como-extrair-e-analisar-dados-do-navegador-do-e-mail-e-mensagens-instantaneas-parte-2-analise-forense/</loc><lastmod>2020-11-06T13:21:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://douglasmendes.code.blog/2020/06/18/como-extrair-e-analisar-dados-do-navegador-do-e-mail-e-mensagens-instantaneas-parte-1-analise-forense/</loc><lastmod>2020-11-06T13:21:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://douglasmendes.code.blog/2020/05/13/como-recuperar-arquivos-deletados-definitivamente-de-um-computador-ou-outros-dispositivos/</loc><lastmod>2020-11-06T13:20:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://douglasmendes.code.blog/2020/05/10/como-apagar-definitivamente-uma-hd-utilizando-o-sistema-operacional-linux-para-analise-forense-facil/</loc><lastmod>2020-11-06T13:19:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://douglasmendes.code.blog/2020/05/06/visao-geral-das-ferramentas-sleuth-kit-o-kit-detetive-e-dos-sistemas-de-arquivos/</loc><lastmod>2020-11-06T13:18:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://douglasmendes.code.blog/2020/05/02/extraindo-imagem-para-analise-forense-com-a-ferramenta-dc3dd/</loc><lastmod>2020-11-06T13:18:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://douglasmendes.code.blog/2020/04/30/como-extrair-uma-imagem-de-um-disco-rigido-pelo-linux-utilizando-a-ferramenta-guymager-para-analise-forense/</loc><lastmod>2020-11-06T13:17:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://douglasmendes.code.blog/2020/04/20/como-esconder-uma-mensagem-esteganografada-dentro-de-um-e-mail-spam-e-mail-falso/</loc><lastmod>2020-11-06T13:17:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://douglasmendes.code.blog/2020/04/19/como-esconder-por-tecnica-de-esteganografia-e-criptografia-pastas-e-drives-no-seu-computador/</loc><image:image><image:loc>https://douglasmendes.code.blog/wp-content/uploads/2020/04/folder-lock-logo.jpg</image:loc><image:title>Folder Lock - Logo</image:title></image:image><lastmod>2020-11-06T13:16:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://douglasmendes.code.blog/2020/04/18/fazendo-clonagem-de-hd-com-guymager-para-analise-forense/</loc><image:image><image:loc>https://douglasmendes.code.blog/wp-content/uploads/2020/04/guymager-imagem-3.png</image:loc><image:title>Guymager - Imagem 3</image:title></image:image><lastmod>2020-11-06T13:16:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://douglasmendes.code.blog/2020/04/17/como-esconder-uma-mensagem-de-texto-dentro-de-um-arquivo-de-texto-usando-os-espacos-em-branco/</loc><image:image><image:loc>https://douglasmendes.code.blog/wp-content/uploads/2020/04/snow-logo.gif</image:loc><image:title>SNOW - logo</image:title></image:image><lastmod>2020-11-06T13:15:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://douglasmendes.code.blog/2020/04/14/como-esconder-uma-mensagem-de-texto-dentro-de-um-audio-segunda-experiencia/</loc><image:image><image:loc>https://douglasmendes.code.blog/wp-content/uploads/2020/04/deepsound-logo.jpg</image:loc><image:title>DeepSound - Logo</image:title></image:image><lastmod>2020-11-06T13:14:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://douglasmendes.code.blog/2020/04/13/como-esconder-uma-mensagem-de-texto-dentro-de-um-audio-isso-existe/</loc><lastmod>2020-11-06T13:13:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://douglasmendes.code.blog/2020/04/11/como-enviar-sem-perigo-seus-dados-pessoais-ou-contas-bancarias-e-sem-deixar-rastros-pelo-smartphone-facilimo/</loc><image:image><image:loc>https://douglasmendes.code.blog/wp-content/uploads/2020/04/image-steganography-logo.png</image:loc><image:title>Image Steganography - Logo</image:title></image:image><lastmod>2020-11-06T13:13:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://douglasmendes.code.blog/2020/04/10/como-enviar-uma-mensagem-escondida-por-tras-de-uma-foto-para-seus-amigos-e-amigas/</loc><image:image><image:loc>https://douglasmendes.code.blog/wp-content/uploads/2020/04/openpuff-logo.png</image:loc><image:title>openpuff - logo</image:title></image:image><lastmod>2020-11-06T13:13:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://douglasmendes.code.blog/2020/03/22/como-criar-um-virus-de-computador-para-sacanear-sua-namoradao-super-facil/</loc><image:image><image:loc>https://douglasmendes.code.blog/wp-content/uploads/2020/03/iloveyou-imagem-0.jpg</image:loc><image:title>iloveyou - imagem 0</image:title></image:image><lastmod>2020-11-06T13:12:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://douglasmendes.code.blog/2020/03/04/experiencia-com-ettercap-2-ataque-dns-spoofing-com-duas-maquinas-linux-mint/</loc><lastmod>2020-11-06T13:12:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://douglasmendes.code.blog/2020/02/29/experiencia-com-ettercap/</loc><image:image><image:loc>https://douglasmendes.code.blog/wp-content/uploads/2020/02/ettercap.png</image:loc><image:title>ettercap</image:title></image:image><lastmod>2020-11-06T13:11:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://douglasmendes.code.blog/2020/02/27/ataque-man-in-the-middle-com-a-ferramenta-ettercap-teorico/</loc><image:image><image:loc>https://douglasmendes.code.blog/wp-content/uploads/2020/02/unix-shot-1518512.jpg</image:loc><image:title>MINOLTA DIGITAL CAMERA</image:title><image:caption>MINOLTA DIGITAL CAMERA</image:caption></image:image><lastmod>2020-11-06T13:11:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://douglasmendes.code.blog/2020/02/22/12-hacks-para-usar-no-cmd-do-windows/</loc><lastmod>2020-11-06T13:10:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://douglasmendes.code.blog/2020/02/18/como-usar-o-wireshark-pela-primeira-vez-pt-2/</loc><image:image><image:loc>https://douglasmendes.code.blog/wp-content/uploads/2020/02/wireshark-1920x1080-1.jpg</image:loc><image:title>Wireshark-1920x1080</image:title></image:image><lastmod>2020-11-06T13:10:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://douglasmendes.code.blog/2020/02/16/como-usar-o-wireshark-pela-primeira-vez-pt-1/</loc><image:image><image:loc>https://douglasmendes.code.blog/wp-content/uploads/2020/02/wireshark-1.png</image:loc><image:title>Wireshark</image:title></image:image><lastmod>2020-11-06T13:09:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://douglasmendes.code.blog/2020/02/12/como-ter-duas-conexoes-de-internet-funcionando-corretamente-no-windows-10/</loc><lastmod>2020-11-06T13:09:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://douglasmendes.code.blog/2020/02/09/como-instalar-ubuntu-no-win10/</loc><image:image><image:loc>https://douglasmendes.code.blog/wp-content/uploads/2020/02/postagem-1-2.jpg</image:loc><image:title>Postagem 1</image:title></image:image><image:image><image:loc>https://douglasmendes.code.blog/wp-content/uploads/2020/02/postagem-1-1.jpg</image:loc><image:title>Postagem 1</image:title></image:image><image:image><image:loc>https://douglasmendes.code.blog/wp-content/uploads/2020/02/postagem-1.jpg</image:loc><image:title>Postagem 1</image:title></image:image><image:image><image:loc>https://douglasmendes.code.blog/wp-content/uploads/2020/02/pexels-photo-30732.jpg</image:loc><image:title>Placeholder Image</image:title></image:image><lastmod>2020-11-06T13:08:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://douglasmendes.code.blog/sobre/</loc><lastmod>2020-02-09T13:11:48+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://douglasmendes.code.blog/contato/</loc><lastmod>2020-02-09T10:19:32+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://douglasmendes.code.blog</loc><changefreq>daily</changefreq><priority>1.0</priority><lastmod>2021-11-08T18:20:13+00:00</lastmod></url></urlset>
