<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Goals on Fabrice's Blog</title><link>https://blog.redteamshell.com/tags/goals/</link><description>Recent content in Goals on Fabrice's Blog</description><generator>Hugo</generator><language>en</language><copyright>&lt;a href="https://creativecommons.org/licenses/by-nc/4.0/" target="_blank" rel="noopener">CC BY-NC 4.0&lt;/a></copyright><lastBuildDate>Sun, 25 Jan 2026 08:17:44 -0500</lastBuildDate><atom:link href="https://blog.redteamshell.com/tags/goals/index.xml" rel="self" type="application/rss+xml"/><item><title>The 2026 Deep Dive</title><link>https://blog.redteamshell.com/posts/2026/01/the-2026-deep-dive/</link><pubDate>Sun, 25 Jan 2026 08:17:44 -0500</pubDate><guid>https://blog.redteamshell.com/posts/2026/01/the-2026-deep-dive/</guid><description>&lt;p>&lt;img src="https://blog.redteamshell.com/images/2026_hero_image.png" alt="Hero Image">&lt;/p>
&lt;h3 id="going-deeper-into-code-review-reverse-engineering-and-web-exploitation">Going Deeper into Code Review, Reverse Engineering, and Web Exploitation&lt;/h3>
&lt;p>New year, new focus. This year I&amp;rsquo;m pushing myself to level up in three specific areas: code review, reverse engineering, and web exploitation. I&amp;rsquo;ve spent enough time doing surface-level testing, now I want to understand what&amp;rsquo;s actually happening under the hood.
I&amp;rsquo;ve already invested in the learning materials to make this happen, so there&amp;rsquo;s no backing out now.&lt;/p></description></item></channel></rss>