<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"><channel><title>SchneiderSec</title><description>Cybersecurity research, vulnerability writeups, code review notes, and practical security lessons from Chris Schneider.</description><link>https://schneidersec.com/</link><item><title>2026 Bug Bounty Setup - Setting up a solid foundation</title><link>https://schneidersec.com/blog/2026-bug-bounty-setup-setting-up-a-solid-foundation/</link><guid isPermaLink="true">https://schneidersec.com/blog/2026-bug-bounty-setup-setting-up-a-solid-foundation/</guid><description>Build a practical 2026 bug bounty environment with Hetzner, Axiom fleets, Claude Code workflows, residential proxies, and cost-aware recon.</description><pubDate>Thu, 14 May 2026 00:00:00 GMT</pubDate></item><item><title>PiHole RCE - The Full Shell Puzzle</title><link>https://schneidersec.com/blog/pi-hole-rce-the-full-shell-puzzle/</link><guid isPermaLink="true">https://schneidersec.com/blog/pi-hole-rce-the-full-shell-puzzle/</guid><description>A vulnerability (CVE-2021-32706) affecting versions &lt;=5.5 of Pi-Hole. Exploiting a mistake in a regex check leads to authenticated remote code execution but with a twist.</description><pubDate>Mon, 09 Aug 2021 00:00:00 GMT</pubDate></item></channel></rss>