<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//haker.edu.pl/wp-content/plugins/wordpress-seo/css/main-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-image/1.1 http://www.google.com/schemas/sitemap-image/1.1/sitemap-image.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
	<url>
		<loc>https://haker.edu.pl/</loc>
		<lastmod>2024-12-25T23:11:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://haker.edu.pl/2013/06/27/manifest-hakera/</loc>
		<lastmod>2013-06-26T22:20:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://haker.edu.pl/2013/06/27/default-router-password/</loc>
		<lastmod>2013-06-27T21:21:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://haker.edu.pl/2013/06/28/silny-pass-to-podstawa/</loc>
		<lastmod>2013-06-28T15:53:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://haker.edu.pl/2013/07/03/cht-z-nieznajomym-na-fb/</loc>
		<lastmod>2013-07-03T21:59:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://haker.edu.pl/2013/08/28/jak-zmienic-ip/</loc>
		<lastmod>2013-08-27T23:59:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://haker.edu.pl/2013/08/31/skanowanie-sieci/</loc>
		<lastmod>2013-08-31T15:30:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://haker.edu.pl/2013/09/02/bezpieczniejszy-chrome/</loc>
		<lastmod>2013-09-01T22:58:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://haker.edu.pl/2013/09/03/online-virus-scanner/</loc>
		<lastmod>2013-09-03T20:10:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://haker.edu.pl/2013/09/25/szybkie-zakladanie-e-maila/</loc>
		<lastmod>2013-09-25T07:11:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://haker.edu.pl/2013/10/04/jak-zlamac-ftp-hydra/</loc>
		<lastmod>2013-10-04T11:57:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://haker.edu.pl/2013/10/10/zmiana-ikony-aplikacji/</loc>
		<lastmod>2013-10-10T11:14:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://haker.edu.pl/2013/10/19/thc-hydra-lamanie-hasla-routera/</loc>
		<lastmod>2013-10-19T19:02:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://haker.edu.pl/2013/10/27/jak-wlamac-sie-na-gg/</loc>
		<lastmod>2013-10-27T20:02:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://haker.edu.pl/2013/10/30/android-na-pc/</loc>
		<lastmod>2013-10-30T10:53:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://haker.edu.pl/2013/11/05/podszywanie-sie-na-facebooku/</loc>
		<lastmod>2013-11-05T12:16:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://haker.edu.pl/2013/11/07/jak-ukryc-kod-php/</loc>
		<lastmod>2013-11-06T23:04:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://haker.edu.pl/2013/11/09/skaner-portow-nmap/</loc>
		<lastmod>2013-11-09T18:25:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://haker.edu.pl/2013/11/12/polecenia-i-komendy-nmap/</loc>
		<lastmod>2013-11-12T20:39:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://haker.edu.pl/2013/11/19/47-dystrybucji-linux-dla-hakerow-spis/</loc>
		<lastmod>2013-11-19T04:09:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://haker.edu.pl/2013/12/05/darmowe-proxy-z-usa-prosto-od-google/</loc>
		<lastmod>2013-12-05T07:50:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://haker.edu.pl/2013/12/08/jaki-tablet-wybrac-gps-3g-android/</loc>
		<lastmod>2013-12-08T17:41:21+00:00</lastmod>
		<image:image>
			<image:loc>https://haker.edu.pl/wp-content/uploads/2021/01/google-asus-nexus-7-tablet.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://haker.edu.pl/2014/01/04/ask-fm-hack-czyli-jak-wlamac-sie-na-aska/</loc>
		<lastmod>2014-01-04T12:32:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://haker.edu.pl/2014/01/07/metoda-simpsona-calka-oznaczona-algorytm-w-c/</loc>
		<lastmod>2014-01-07T12:19:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://haker.edu.pl/2014/01/08/zbior-4-malych-linuksow-maly-linux-przeglad/</loc>
		<lastmod>2014-01-08T10:53:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://haker.edu.pl/2014/01/08/problem-z-profilem-chromium-na-linux-rozwiazanie/</loc>
		<lastmod>2014-01-08T14:21:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://haker.edu.pl/2014/01/09/jak-automatycznie-montowac-partycje-ntfs-w-linux-ubuntu/</loc>
		<lastmod>2014-01-09T20:57:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://haker.edu.pl/2014/01/11/jak-sciagnac-i-skompilowac-thc-hydra-w-systemie-linux/</loc>
		<lastmod>2014-01-11T12:36:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://haker.edu.pl/2014/01/14/prosty-licznik-pobran-w-php/</loc>
		<lastmod>2014-01-14T16:10:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://haker.edu.pl/2014/01/16/jak-obliczyc-silnie-java-ok/</loc>
		<lastmod>2014-01-16T14:44:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://haker.edu.pl/2014/01/16/metoda-simpsona-kod-w-octave-matlab/</loc>
		<lastmod>2014-01-16T14:46:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://haker.edu.pl/2014/01/28/szukanie-przyblizonego-pierwiastka-funkcji-metoda-siecznych-w-octave-matlab/</loc>
		<lastmod>2014-01-28T20:21:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://haker.edu.pl/2014/02/20/sercem-z-ukraina-i-like-it/</loc>
		<lastmod>2014-02-20T13:18:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://haker.edu.pl/2014/02/27/lamanie-hasla-do-teamspeaka-brute-force/</loc>
		<lastmod>2014-02-27T19:46:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://haker.edu.pl/2014/04/27/truecrypt-spolszczenie-czyli-jak-zmienic-jezyk-na-pl/</loc>
		<lastmod>2014-04-26T22:17:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://haker.edu.pl/2014/04/27/szyfrowanie-dysku-systemowego-truecrypt-instrukcja/</loc>
		<lastmod>2014-04-27T20:42:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://haker.edu.pl/2014/04/30/truecrypt-zmiana-tresci-boot-loadera/</loc>
		<lastmod>2014-04-30T17:08:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://haker.edu.pl/2014/06/08/kali-linux-no-bootable-medium-found-unable-to-boot-virtualbox/</loc>
		<lastmod>2014-06-07T22:27:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://haker.edu.pl/2014/06/26/problem-infomatow-czyli-jak-hakuja-infokioski/</loc>
		<lastmod>2014-06-26T17:35:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://haker.edu.pl/2014/06/29/10-najpopularniejszych-metod-atakow-i-obrony-hakerow-spis/</loc>
		<lastmod>2014-06-29T14:18:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://haker.edu.pl/2014/07/01/jak-zmienic-adres-mac-komputera-windows/</loc>
		<lastmod>2014-07-01T12:01:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://haker.edu.pl/2014/07/01/jak-sprawdzic-adres-mac-windows-phone-8/</loc>
		<lastmod>2014-07-01T18:07:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://haker.edu.pl/2014/08/16/darmowy-vpn-client-pod-windowsa-od-avasta/</loc>
		<lastmod>2014-08-16T01:26:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://haker.edu.pl/2014/08/20/kaspersky-rescue-disk-darmowy-download/</loc>
		<lastmod>2014-08-20T15:24:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://haker.edu.pl/2014/09/13/darmowy-tymczasowy-mail/</loc>
		<lastmod>2014-09-13T12:52:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://haker.edu.pl/2014/09/19/ksiazka-dla-hakerow-dawid-farbaniec/</loc>
		<lastmod>2014-09-18T22:06:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://haker.edu.pl/2014/10/25/267kk-prawo-dla-informatykow-keylogger/</loc>
		<lastmod>2014-10-25T19:22:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://haker.edu.pl/2014/10/26/joomla-ochrona-backup-captcha-i-security/</loc>
		<lastmod>2014-10-26T12:54:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://haker.edu.pl/2014/11/20/jak-zalozyc-strone-internetowa/</loc>
		<lastmod>2014-11-20T17:25:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://haker.edu.pl/2014/11/21/jak-wylogowac-sie-zdalnie-z-poczty/</loc>
		<lastmod>2014-11-21T19:35:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://haker.edu.pl/2014/12/30/jak-zlamac-haslo-zip/</loc>
		<lastmod>2014-12-30T14:23:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://haker.edu.pl/2015/04/01/dban-trwale-wymazywanie-dysku/</loc>
		<lastmod>2015-04-01T17:19:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://haker.edu.pl/2015/05/31/szyfrowanie-dysku-samsung-evo-840-850-pro/</loc>
		<lastmod>2015-05-31T19:01:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://haker.edu.pl/2015/07/10/google-hacking-google-dorks/</loc>
		<lastmod>2015-07-10T19:01:42+00:00</lastmod>
		<image:image>
			<image:loc>https://haker.edu.pl/wp-content/uploads/2021/01/google-hacking-narzedzia.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://haker.edu.pl/2015/07/17/haker-film-fabularny/</loc>
		<lastmod>2015-07-17T11:39:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://haker.edu.pl/2015/09/20/co-to-jest-php-shell/</loc>
		<lastmod>2015-09-20T13:02:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://haker.edu.pl/2015/09/21/wyskakujace-reklamy-chrome-opera-firefox/</loc>
		<lastmod>2015-09-21T19:18:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://haker.edu.pl/2015/09/23/wirus-na-stronie-php-shell/</loc>
		<lastmod>2015-09-23T11:01:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://haker.edu.pl/2015/10/01/haker-film-fabularny-cz-2/</loc>
		<lastmod>2015-10-01T15:12:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://haker.edu.pl/2015/10/05/autologowanie-w-windows-8-1/</loc>
		<lastmod>2015-10-05T14:04:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://haker.edu.pl/2015/10/06/eksport-zainstalowanych-programow/</loc>
		<lastmod>2015-10-06T13:41:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://haker.edu.pl/2015/10/07/szyfrowanie-plikow-xor-w-c/</loc>
		<lastmod>2015-10-07T17:30:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://haker.edu.pl/2015/10/10/generowanie-losowego-tekstu/</loc>
		<lastmod>2015-10-10T16:50:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://haker.edu.pl/2015/10/14/wireshark-sniffer-i-tcpdump-podsluch/</loc>
		<lastmod>2015-10-14T13:35:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://haker.edu.pl/2015/10/26/php-curl-upload-pliku/</loc>
		<lastmod>2015-10-26T13:33:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://haker.edu.pl/2015/11/09/atak-na-ssh-authorized_keys/</loc>
		<lastmod>2015-11-09T21:50:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://haker.edu.pl/2015/11/22/deep-web-jak-sie-dostac-do-ukrytej-sieci/</loc>
		<lastmod>2015-11-22T10:34:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://haker.edu.pl/2015/11/23/payload-i-msfvenom/</loc>
		<lastmod>2015-11-23T10:22:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://haker.edu.pl/2015/11/30/php-payload-shell/</loc>
		<lastmod>2015-11-30T13:23:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://haker.edu.pl/2015/11/30/darmowe-proxy-whonix-i-tor/</loc>
		<lastmod>2015-11-30T16:31:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://haker.edu.pl/2015/12/08/darmowy-hosting-tor-onion/</loc>
		<lastmod>2015-12-08T18:33:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://haker.edu.pl/2015/12/09/jpg-jako-php-w-htaccess/</loc>
		<lastmod>2015-12-09T16:47:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://haker.edu.pl/2015/12/14/dns-spoofing-i-arp-poisoning/</loc>
		<lastmod>2015-12-14T13:32:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://haker.edu.pl/2016/01/14/php-htaccess-deny-from-all/</loc>
		<lastmod>2016-01-14T05:57:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://haker.edu.pl/2016/01/25/http-post-dictionary-attack-hydra/</loc>
		<lastmod>2016-01-25T12:45:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://haker.edu.pl/2016/02/03/kali-linux-instalacja-xfce/</loc>
		<lastmod>2016-02-03T10:54:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://haker.edu.pl/2016/02/04/linux-split-file-and-php/</loc>
		<lastmod>2016-02-04T15:36:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://haker.edu.pl/2016/02/05/download-a-website-httrack-wget/</loc>
		<lastmod>2016-02-05T14:21:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://haker.edu.pl/2016/02/26/vmware-vmx-to-virtualbox-ova/</loc>
		<lastmod>2016-02-26T08:15:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://haker.edu.pl/2016/03/01/fake-wifi-i-wifiphisher-ap/</loc>
		<lastmod>2016-03-01T11:01:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://haker.edu.pl/2016/03/12/niebezpieczny-plik-hosts/</loc>
		<lastmod>2016-03-12T18:10:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://haker.edu.pl/2016/03/30/keylogger-android-apk/</loc>
		<lastmod>2016-03-30T18:49:37+00:00</lastmod>
		<image:image>
			<image:loc>https://haker.edu.pl/wp-content/uploads/2021/01/podsluch-w-telefonie-komorkowym.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://haker.edu.pl/wp-content/uploads/2021/01/podsluchany-sms-keylogger.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://haker.edu.pl/wp-content/uploads/2021/01/szpieg-sms-android.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://haker.edu.pl/wp-content/uploads/2021/01/antywirus-android-wykryl-kejloggera.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://haker.edu.pl/2016/04/10/kurs-web-application-pentesting/</loc>
		<lastmod>2016-04-10T03:29:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://haker.edu.pl/2016/04/12/php-html-i-brute-force-lekcja-wap-3/</loc>
		<lastmod>2016-04-11T23:04:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://haker.edu.pl/2016/04/15/dirbuster-hydra-i-phpmyadmin-lekcja-wap-4/</loc>
		<lastmod>2016-04-14T23:14:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://haker.edu.pl/2016/04/16/wprowadzenie-do-ciasteczek-php-lekcja-wap-5/</loc>
		<lastmod>2016-04-16T19:45:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://haker.edu.pl/2016/04/17/cookie-cadger-sniffer-i-cookies-wap-6/</loc>
		<lastmod>2016-04-17T12:59:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://haker.edu.pl/2016/04/19/thc-hydra-cookies-i-headers-wap-7/</loc>
		<lastmod>2016-04-19T12:14:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://haker.edu.pl/2016/04/21/command-injection-cmd-w-php-wep-8/</loc>
		<lastmod>2016-04-21T13:37:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://haker.edu.pl/2016/04/23/atak-csrf-xsrf-i-hasla-wep-9/</loc>
		<lastmod>2016-04-23T13:53:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://haker.edu.pl/2016/04/25/atak-mime-type-na-upload-php/</loc>
		<lastmod>2016-04-25T14:04:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://haker.edu.pl/2016/04/27/atak-lfi-i-fimap-w-kali-linux-wep-11/</loc>
		<lastmod>2016-04-27T09:19:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://haker.edu.pl/2016/04/29/atak-rfi-remote-file-inclusion-wep-12/</loc>
		<lastmod>2016-04-29T18:03:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://haker.edu.pl/2016/11/15/kali-linux-na-usb/</loc>
		<lastmod>2018-03-25T19:44:56+00:00</lastmod>
		<image:image>
			<image:loc>https://haker.edu.pl/wp-content/uploads/2016/11/instalacja-kali-linux-usb-pendrive.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://haker.edu.pl/wp-content/uploads/2016/11/bootowanie-usb-msi-kalilinux.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://haker.edu.pl/2016/09/30/odzyskiwanie-skasowanych-zdjec/</loc>
		<lastmod>2018-03-25T19:46:43+00:00</lastmod>
		<image:image>
			<image:loc>https://haker.edu.pl/wp-content/uploads/2016/09/odzyskiwanie-skasowanych-zdjec-sd.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://haker.edu.pl/2016/05/23/kod-captcha-obejscie-w-php-wep-21/</loc>
		<lastmod>2018-03-27T18:08:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://haker.edu.pl/2016/05/20/sqlmap-jsql-w-kali-linux-wep-20/</loc>
		<lastmod>2018-03-27T18:09:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://haker.edu.pl/2016/05/17/atak-blind-sql-injection-i-haslo-wep-19/</loc>
		<lastmod>2018-03-27T18:13:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://haker.edu.pl/2016/05/15/sql-injection-w-praktyce-wep-18/</loc>
		<lastmod>2018-03-27T18:17:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://haker.edu.pl/2016/05/12/podstawy-sql-injection-wep-17/</loc>
		<lastmod>2018-03-27T18:20:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://haker.edu.pl/2016/05/09/beef-xss-w-kali-linux-wep-16/</loc>
		<lastmod>2018-03-27T18:22:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://haker.edu.pl/2016/05/06/xss-i-session-hijacking-cookies-wep-15/</loc>
		<lastmod>2018-03-27T18:23:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://haker.edu.pl/2016/05/04/atak-csrf-z-xss-w-dvwa-wep-14/</loc>
		<lastmod>2018-03-27T18:26:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://haker.edu.pl/2016/05/02/atak-xss-cross-site-scripting-wep-13/</loc>
		<lastmod>2018-03-27T18:28:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://haker.edu.pl/2016/02/25/md5-decrypter-sha1-i-oclhashcat/</loc>
		<lastmod>2018-12-25T10:56:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://haker.edu.pl/2015/07/08/haker-blog-nowosci/</loc>
		<lastmod>2021-01-24T08:24:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://haker.edu.pl/2016/02/09/demonsaw-social-crypto-ochrona-przed-inwigilacja/</loc>
		<lastmod>2021-01-24T08:34:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://haker.edu.pl/2016/04/01/haker-aresztowany-blog-zamkniety/</loc>
		<lastmod>2021-01-24T09:04:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://haker.edu.pl/2018/03/26/cewl-generator-spersonalizowanych-hasel-slownikowych/</loc>
		<lastmod>2021-09-29T22:54:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://haker.edu.pl/2017/04/27/ochrona-arp-poisoning-i-arpon/</loc>
		<lastmod>2021-09-29T23:08:03+00:00</lastmod>
		<image:image>
			<image:loc>https://haker.edu.pl/wp-content/uploads/2017/04/ochrona-przed-man-in-the-middle-arp.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://haker.edu.pl/wp-content/uploads/2017/04/arpon-arp-poisoning.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://haker.edu.pl/wp-content/uploads/2017/04/atak-hakerski-arpspoof.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://haker.edu.pl/wp-content/uploads/2017/04/zmodyfikowany-adres-mac-routera-kali-linux.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://haker.edu.pl/wp-content/uploads/2017/04/statyczny-arp-adres-mac.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://haker.edu.pl/wp-content/uploads/2017/04/obrona-przed-mitm-spoofing-deny-w-arpon.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://haker.edu.pl/wp-content/uploads/2017/04/nmap-odnalezienie-napastnika-crackera-hakera.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://haker.edu.pl/wp-content/uploads/2017/04/arp-poisoning-ochrona-w-windows-static-mac.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://haker.edu.pl/wp-content/uploads/2017/04/windows-statyczny-mac.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://haker.edu.pl/2017/04/14/przekierowanie-portow/</loc>
		<lastmod>2021-09-29T23:10:52+00:00</lastmod>
		<image:image>
			<image:loc>https://haker.edu.pl/wp-content/uploads/2017/04/przekierowanie-portow-poradnik.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://haker.edu.pl/wp-content/uploads/2017/04/adres-ip-routera-brama-domyslna.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://haker.edu.pl/wp-content/uploads/2017/04/przekierowanie-portow-upc-thomson.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://haker.edu.pl/wp-content/uploads/2017/04/przekierowanie-portow-tp-link.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://haker.edu.pl/wp-content/uploads/2017/04/port-forwarding-d-link.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://haker.edu.pl/wp-content/uploads/2017/04/generowanie-msfvenom-ladunku.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://haker.edu.pl/wp-content/uploads/2017/04/port-forwarding-metasploit-kali-linux.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://haker.edu.pl/wp-content/uploads/2017/04/microsoft-windows-metasploit-tutorial.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://haker.edu.pl/2017/03/20/darmowy-crypter-msfvenom/</loc>
		<lastmod>2021-09-29T23:14:21+00:00</lastmod>
		<image:image>
			<image:loc>https://haker.edu.pl/wp-content/uploads/2017/03/msfvenom-crypter-wirusow.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://haker.edu.pl/wp-content/uploads/2017/03/wygenerowany-payload-kali-linux.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://haker.edu.pl/2016/09/06/meterpreter-autostart/</loc>
		<lastmod>2021-09-29T23:15:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://haker.edu.pl/2015/10/22/linux-jezyk-polski-man/</loc>
		<lastmod>2021-09-30T02:28:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://haker.edu.pl/2015/05/21/zabezpieczenie-uploadera-php-exif/</loc>
		<lastmod>2021-09-30T02:28:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://haker.edu.pl/2015/01/11/facebook-hack-kod-sms/</loc>
		<lastmod>2021-09-30T02:28:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://haker.edu.pl/2014/07/05/jak-odciac-komus-internet-wifi/</loc>
		<lastmod>2021-09-30T02:30:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://haker.edu.pl/2014/03/06/jak-wlamac-sie-na-strone-internetowa-kurs-uploadera-2/</loc>
		<lastmod>2021-09-30T02:30:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://haker.edu.pl/2016/08/21/aplikacje-w-kali-linux-2/</loc>
		<lastmod>2021-09-30T12:30:30+00:00</lastmod>
		<image:image>
			<image:loc>https://haker.edu.pl/wp-content/uploads/2016/08/Information-Gathering.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://haker.edu.pl/wp-content/uploads/2016/08/Vulnerability-Analysis.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://haker.edu.pl/wp-content/uploads/2016/08/Web-Application-Analysis.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://haker.edu.pl/wp-content/uploads/2016/08/Database-Assessment.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://haker.edu.pl/wp-content/uploads/2016/08/Password-Attacks.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://haker.edu.pl/wp-content/uploads/2016/08/Wireless-Attacks-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://haker.edu.pl/wp-content/uploads/2016/08/Reverse-Engineering.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://haker.edu.pl/wp-content/uploads/2016/08/Exploitation-Tools.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://haker.edu.pl/wp-content/uploads/2016/08/Sniffing-Spoofing.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://haker.edu.pl/wp-content/uploads/2016/08/Post-Exploitation.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://haker.edu.pl/wp-content/uploads/2016/08/Forensics.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://haker.edu.pl/wp-content/uploads/2016/08/Reporting-Tools.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://haker.edu.pl/wp-content/uploads/2016/08/System-Services.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://haker.edu.pl/wp-content/uploads/2016/08/Usual-applications.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://haker.edu.pl/2016/08/01/msfcli-w-kali-linux-2-0/</loc>
		<lastmod>2021-09-30T12:36:23+00:00</lastmod>
		<image:image>
			<image:loc>https://haker.edu.pl/wp-content/uploads/2016/08/msfcli-w-kali-linux-2016-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://haker.edu.pl/2016/06/27/proxychains-tor-w-kali-linux/</loc>
		<lastmod>2021-09-30T13:00:42+00:00</lastmod>
		<image:image>
			<image:loc>https://haker.edu.pl/wp-content/uploads/2016/06/komenda-proxychains-i-tor.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://haker.edu.pl/wp-content/uploads/2016/06/instalacja-sieci-tor-w-Kali-Linux.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://haker.edu.pl/wp-content/uploads/2016/06/konfiguracja-proxy-tor-w-vega-.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://haker.edu.pl/2016/06/03/netsh-firewall-cmd/</loc>
		<lastmod>2021-09-30T13:09:02+00:00</lastmod>
		<image:image>
			<image:loc>https://haker.edu.pl/wp-content/uploads/2016/06/netsh-firewall-w-cmd-exe.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://haker.edu.pl/wp-content/uploads/2016/06/konfiguracja-zapory-windows-w-konsoli.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://haker.edu.pl/wp-content/uploads/2016/06/advfirewall-wyswietlanie-regul.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://haker.edu.pl/wp-content/uploads/2016/06/resetowanie-ustawien-firewall-w-wierszu-polecen.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://haker.edu.pl/wp-content/uploads/2016/06/dodawanie-otwartego-portu-windows-netsh.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://haker.edu.pl/wp-content/uploads/2016/06/dodawanie-wyjatku-programu-firewall-cmd.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://haker.edu.pl/wp-content/uploads/2016/06/usuwanie-reguly-zapory-firewall.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://haker.edu.pl/wp-content/uploads/2016/06/usuwanie-wyjatku-zapory-windows.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://haker.edu.pl/2016/06/01/dziwne-wstrzykiwanie-sql-w-dvwa/</loc>
		<lastmod>2021-09-30T13:21:09+00:00</lastmod>
		<image:image>
			<image:loc>https://haker.edu.pl/wp-content/uploads/2016/06/kod-zrodlowy-php-z-sql-injection.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://haker.edu.pl/wp-content/uploads/2016/06/wstrzykiwanie-sql-podczas-logowania-formularza.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://haker.edu.pl/wp-content/uploads/2016/06/operator-or-w-wstrzykiwaniu-sql.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://haker.edu.pl/wp-content/uploads/2016/06/dvwa-sql-injection-z-operatorem-lub.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://haker.edu.pl/2016/05/30/koniec-kursu-hakerskiego-wap-24/</loc>
		<lastmod>2021-09-30T13:23:00+00:00</lastmod>
		<image:image>
			<image:loc>https://haker.edu.pl/wp-content/uploads/2016/05/najpopularniejsze-ataki-hakerskie-sql-xss.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://haker.edu.pl/2016/05/27/haslo-z-ophcrack-windows-7-8-10-xp/</loc>
		<lastmod>2021-09-30T13:33:22+00:00</lastmod>
		<image:image>
			<image:loc>https://haker.edu.pl/wp-content/uploads/2016/05/lamanie-hasla-windows-ophcrack.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://haker.edu.pl/wp-content/uploads/2016/05/nagrywanie-iso-kali-linux.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://haker.edu.pl/wp-content/uploads/2016/05/kali-linux-dyski-montowanie.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://haker.edu.pl/wp-content/uploads/2016/05/narzedzie-dyski-do-montazu-windows.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://haker.edu.pl/wp-content/uploads/2016/05/IS_ophcrack-tables-download.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://haker.edu.pl/wp-content/uploads/2016/05/ophcrack-rainbow-tables-download.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://haker.edu.pl/wp-content/uploads/2016/05/zlamane-haslo-windows-7.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://haker.edu.pl/2016/05/26/vega-nmap-skipfish-nikito-w-kali-linux-wep-22/</loc>
		<lastmod>2021-09-30T13:35:41+00:00</lastmod>
		<image:image>
			<image:loc>https://haker.edu.pl/wp-content/uploads/2016/05/narzedzie-hakerskie-owasp-zap-kali-linux.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://haker.edu.pl/2013/09/14/jak-sprawdzic-czyjes-ip/</loc>
		<lastmod>2021-09-30T14:31:30+00:00</lastmod>
		<image:image>
			<image:loc>https://haker.edu.pl/wp-content/uploads/2013/09/jak-sprawdzic-czyjes-ip.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://haker.edu.pl/2013/09/22/rozne-metody-hakowania-konta-facebook/</loc>
		<lastmod>2021-09-30T17:39:51+00:00</lastmod>
		<image:image>
			<image:loc>https://haker.edu.pl/wp-content/uploads/2013/09/rozne-metody-hakowania-konta-Facebook.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://haker.edu.pl/wp-content/uploads/2013/09/inzynieria-spoleczna-scaled.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://haker.edu.pl/wp-content/uploads/2013/09/facebook-phone-hacking-144x300-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://haker.edu.pl/wp-content/uploads/2013/09/facebook-mitm-hacking-tutorial-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://haker.edu.pl/2014/01/03/jak-wykonac-atak-ddos-na-router/</loc>
		<lastmod>2021-09-30T18:29:19+00:00</lastmod>
		<image:image>
			<image:loc>https://haker.edu.pl/wp-content/uploads/2014/01/jak-wykonac-atak-ddos.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://haker.edu.pl/wp-content/uploads/2014/01/program-do-ddos-loic.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://haker.edu.pl/2014/02/25/programy-do-lamania-hasel/</loc>
		<lastmod>2021-09-30T19:32:35+00:00</lastmod>
		<image:image>
			<image:loc>https://haker.edu.pl/wp-content/uploads/2014/02/program-do-lamania-hasel-brutus.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://haker.edu.pl/wp-content/uploads/2014/02/rainbowcrack-do-teczowych-tablic.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://haker.edu.pl/wp-content/uploads/2014/02/cain-and-abel-2-na-windows.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://haker.edu.pl/wp-content/uploads/2014/02/pwdump3-sam.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://haker.edu.pl/wp-content/uploads/2014/02/elomsoft-distributed-password-recovery.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://haker.edu.pl/wp-content/uploads/2014/02/elcomsoft-system-recovery-do-windows.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://haker.edu.pl/wp-content/uploads/2014/02/proactive-password-auditor.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://haker.edu.pl/wp-content/uploads/2014/02/system-operacyjny-ophcrack.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://haker.edu.pl/wp-content/uploads/2014/02/john-the-ripper-brute-force.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://haker.edu.pl/2016/03/14/jak-zostac-hakerem/</loc>
		<lastmod>2021-09-30T19:45:57+00:00</lastmod>
		<image:image>
			<image:loc>https://haker.edu.pl/wp-content/uploads/2016/03/jak-zostac-hackerem-anonymous-polska.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://haker.edu.pl/wp-content/uploads/2016/03/najpopularniejsze-jezyki-programowania-2015.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://haker.edu.pl/wp-content/uploads/2016/03/systemy-linux-dla-poczatkujacych-hakerow.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://haker.edu.pl/wp-content/uploads/2016/03/subskrybuj-rss-haker-edu-pl.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://haker.edu.pl/wp-content/uploads/2016/03/bezpieczny-system-w-praktyce-recenzja.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://haker.edu.pl/wp-content/uploads/2016/03/jak-zostac-hakerem-w-pracy.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://haker.edu.pl/wp-content/uploads/2016/03/mem-stack-overflow.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://haker.edu.pl/wp-content/uploads/2016/03/open-soruce-od-hakerow.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://haker.edu.pl/wp-content/uploads/2016/03/jak-zalozyc-strone-www-blogger.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://haker.edu.pl/2013/10/29/darmowy-serwer-ftp/</loc>
		<lastmod>2021-09-30T20:08:34+00:00</lastmod>
		<image:image>
			<image:loc>https://haker.edu.pl/wp-content/uploads/2013/10/strona-startowa-cba.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://haker.edu.pl/wp-content/uploads/2013/10/330.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://haker.edu.pl/wp-content/uploads/2013/10/darmowy-serwer-ftp.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://haker.edu.pl/wp-content/uploads/2013/10/cyberfolks-plany-hosting.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://haker.edu.pl/2015/10/02/generowanie-slownika-linux/</loc>
		<lastmod>2021-09-30T23:18:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://haker.edu.pl/2014/09/25/generator-hasel-i-portfel-na-haslo/</loc>
		<lastmod>2021-10-01T01:02:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://haker.edu.pl/2017/12/16/encrypt-string-class/</loc>
		<lastmod>2021-10-01T01:06:49+00:00</lastmod>
		<image:image>
			<image:loc>https://haker.edu.pl/wp-content/uploads/2017/12/string-encrypt-cpp-programming.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://haker.edu.pl/wp-content/uploads/2017/12/szyfrowanie-string-encrypt-cpp.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://haker.edu.pl/2017/12/08/wskazniki-na-funkcje-fud/</loc>
		<lastmod>2021-10-01T01:07:23+00:00</lastmod>
		<image:image>
			<image:loc>https://haker.edu.pl/wp-content/uploads/2017/12/import-table-dll-wskazniki-na-funkcje.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://haker.edu.pl/2013/10/16/android-antywirus-test/</loc>
		<lastmod>2021-10-01T01:22:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://haker.edu.pl/2016/01/04/najlepszy-antywirus-android/</loc>
		<lastmod>2021-10-01T01:22:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://haker.edu.pl/2016/05/28/atak-hakera-w-kali-linux-wap-23/</loc>
		<lastmod>2021-10-10T01:25:18+00:00</lastmod>
		<image:image>
			<image:loc>https://haker.edu.pl/wp-content/uploads/2016/05/atak-hakerski-a-audyt-bezpieczenstwa-www.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://haker.edu.pl/2016/02/20/jak-zlamac-haslo-wifi/</loc>
		<lastmod>2021-10-10T23:04:29+00:00</lastmod>
		<image:image>
			<image:loc>https://haker.edu.pl/wp-content/uploads/2016/02/usb-wifi-adapter.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://haker.edu.pl/wp-content/uploads/2016/02/wardriving-wifi-ssid.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://haker.edu.pl/wp-content/uploads/2016/02/haslo-do-wifi-w-windows.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://haker.edu.pl/wp-content/uploads/2016/02/aircrack-znalezione-sieci-bezprzewodowe.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://haker.edu.pl/wp-content/uploads/2016/02/handshake-wpa2.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://haker.edu.pl/wp-content/uploads/2016/02/haslodowifi.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://haker.edu.pl/wp-content/uploads/2016/02/liczba-danych-aircrack.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://haker.edu.pl/2013/09/26/lamanie-hasla-routera/</loc>
		<lastmod>2021-10-10T23:08:15+00:00</lastmod>
		<image:image>
			<image:loc>https://haker.edu.pl/wp-content/uploads/2013/09/Schemat-blokowy-thc-hydra.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://haker.edu.pl/2014/09/02/lekcja1-instalacja-kali-linux-w-vmware/</loc>
		<lastmod>2021-10-12T20:49:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://haker.edu.pl/2014/09/02/lekcja2-testujemy-polaczenie-sieciowe-ping/</loc>
		<lastmod>2021-10-12T20:50:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://haker.edu.pl/2014/09/04/lekcja-3-kurs-i-komendy-linux/</loc>
		<lastmod>2021-10-12T20:51:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://haker.edu.pl/2014/09/06/lekcja-4-skaner-portow-nmap/</loc>
		<lastmod>2021-10-12T20:52:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://haker.edu.pl/2014/09/07/lekcja-5-nessus-skaner-bezpieczenstwa-komputera/</loc>
		<lastmod>2021-10-12T20:52:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://haker.edu.pl/2014/10/13/jak-sie-wlamac-do-systemu-windows/</loc>
		<lastmod>2021-10-12T20:53:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://haker.edu.pl/2013/09/01/jak-wlamac-sie-na-fb/</loc>
		<lastmod>2021-10-12T20:54:42+00:00</lastmod>
		<image:image>
			<image:loc>https://haker.edu.pl/wp-content/uploads/2013/09/jak-wlamac-sie-na-facebooka.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://haker.edu.pl/wp-content/uploads/2013/09/facebook-phishing.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://haker.edu.pl/2013/12/03/darmowy-home-keylogger-freeware/</loc>
		<lastmod>2021-10-12T20:55:47+00:00</lastmod>
		<image:image>
			<image:loc>https://haker.edu.pl/wp-content/uploads/2013/12/keylogger-freeware.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://haker.edu.pl/wp-content/uploads/2013/12/sprzetowy-keylogger.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://haker.edu.pl/wp-content/uploads/2013/12/revealer-keylogger-za-darmo.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://haker.edu.pl/2014/09/05/jak-wyrzucic-kogos-z-wifi/</loc>
		<lastmod>2021-10-12T20:56:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://haker.edu.pl/2016/09/01/konfiguracja-openvas/</loc>
		<lastmod>2021-10-12T20:58:52+00:00</lastmod>
		<image:image>
			<image:loc>https://haker.edu.pl/wp-content/uploads/2016/09/panel-administracyjny-openvas.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://haker.edu.pl/2013/11/27/jak-wlamac-sie-na-strone-internetowa-kurs-xss-1/</loc>
		<lastmod>2021-10-12T21:01:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://haker.edu.pl/2016/07/30/jak-wlaczyc-kamerke-i-exploit-pdf/</loc>
		<lastmod>2021-10-12T21:02:55+00:00</lastmod>
		<image:image>
			<image:loc>https://haker.edu.pl/wp-content/uploads/2016/07/jak-wlaczyc-kamere-w-laptopie-i-mikrofon.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://haker.edu.pl/wp-content/uploads/2016/07/tworzenie-exploit-pdf-w-libreoffice.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://haker.edu.pl/wp-content/uploads/2016/07/wirus-w-pdf-w-metasploit.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://haker.edu.pl/wp-content/uploads/2016/07/wyszukiwarka-exploitow-search-msf.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://haker.edu.pl/2014/01/03/jak-chronic-konto-internetowe-przed-phishingiem/</loc>
		<lastmod>2022-12-14T21:42:16+00:00</lastmod>
		<image:image>
			<image:loc>http://haker.edu.pl/wp-content/uploads/2014/01/phishing-spam-haker-scaled.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://haker.edu.pl/wp-content/uploads/2021/01/wyciagi_do_rachunkow.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://haker.edu.pl/2014/03/15/czym-jest-footprinting/</loc>
		<lastmod>2022-12-14T21:57:00+00:00</lastmod>
		<image:image>
			<image:loc>http://haker.edu.pl/wp-content/uploads/2014/03/narzedzie-dirbuster.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://haker.edu.pl/wp-content/uploads/2014/03/wtyczka-hakerska-wappalyzer.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://haker.edu.pl/2013/10/14/generowanie-slownika-brute-force/</loc>
		<lastmod>2022-12-14T22:13:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://haker.edu.pl/2013/12/10/jak-wlamac-sie-na-poczte-mail-hacking/</loc>
		<lastmod>2024-12-25T23:11:10+00:00</lastmod>
		<image:image>
			<image:loc>https://haker.edu.pl/wp-content/uploads/2013/12/jak-wlamac-sie-na-poczte.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://haker.edu.pl/wp-content/uploads/2013/12/jak-odzyskac-haslo-do-poczty-hydra.jpg</image:loc>
		</image:image>
	</url>
</urlset>
<!-- XML Sitemap generated by Yoast SEO -->