<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
  xmlns:xhtml="http://www.w3.org/1999/xhtml">
  <url>
    <loc>/posts/attacking-cups-a-half-empty-rce-vulnerability/</loc>
    <lastmod>2024-09-26T16:39:44-04:00</lastmod>
  </url><url>
    <loc>/tags/cups/</loc>
    <lastmod>2024-09-26T16:39:44-04:00</lastmod>
  </url><url>
    <loc>/tags/cups-browsed/</loc>
    <lastmod>2024-09-26T16:39:44-04:00</lastmod>
  </url><url>
    <loc>/tags/disclosure/</loc>
    <lastmod>2024-09-26T16:39:44-04:00</lastmod>
  </url><url>
    <loc>/tags/exploit/</loc>
    <lastmod>2024-09-26T16:39:44-04:00</lastmod>
  </url><url>
    <loc>/tags/hacking/</loc>
    <lastmod>2024-09-26T16:39:44-04:00</lastmod>
  </url><url>
    <loc>/tags/ipp/</loc>
    <lastmod>2024-09-26T16:39:44-04:00</lastmod>
  </url><url>
    <loc>/posts/</loc>
    <lastmod>2024-09-26T16:39:44-04:00</lastmod>
  </url><url>
    <loc>/tags/printer/</loc>
    <lastmod>2024-09-26T16:39:44-04:00</lastmod>
  </url><url>
    <loc>/tags/printing/</loc>
    <lastmod>2024-09-26T16:39:44-04:00</lastmod>
  </url><url>
    <loc>/tags/rce/</loc>
    <lastmod>2024-09-26T16:39:44-04:00</lastmod>
  </url><url>
    <loc>/tags/responsible-disclosure/</loc>
    <lastmod>2024-09-26T16:39:44-04:00</lastmod>
  </url><url>
    <loc>/</loc>
    <lastmod>2024-09-26T16:39:44-04:00</lastmod>
  </url><url>
    <loc>/tags/</loc>
    <lastmod>2024-09-26T16:39:44-04:00</lastmod>
  </url><url>
    <loc>/tags/udp/</loc>
    <lastmod>2024-09-26T16:39:44-04:00</lastmod>
  </url><url>
    <loc>/tags/unix/</loc>
    <lastmod>2024-09-26T16:39:44-04:00</lastmod>
  </url><url>
    <loc>/tags/zeroconf/</loc>
    <lastmod>2024-09-26T16:39:44-04:00</lastmod>
  </url><url>
    <loc>/tags/ai/</loc>
    <lastmod>2024-08-29T17:48:34-04:00</lastmod>
  </url><url>
    <loc>/tags/detection-rules/</loc>
    <lastmod>2024-08-29T17:48:34-04:00</lastmod>
  </url><url>
    <loc>/tags/kql/</loc>
    <lastmod>2024-08-29T17:48:34-04:00</lastmod>
  </url><url>
    <loc>/posts/leveraging-ai-for-effective-threat-hunting-and-detections/</loc>
    <lastmod>2024-08-29T17:48:34-04:00</lastmod>
  </url><url>
    <loc>/tags/roota/</loc>
    <lastmod>2024-08-29T17:48:34-04:00</lastmod>
  </url><url>
    <loc>/tags/sigma/</loc>
    <lastmod>2024-08-29T17:48:34-04:00</lastmod>
  </url><url>
    <loc>/tags/threat-hunting/</loc>
    <lastmod>2024-08-29T17:48:34-04:00</lastmod>
  </url><url>
    <loc>/posts/auditing-insecure-mfa-methods-used-in-microsoft-entra-with-log-analytics/</loc>
    <lastmod>2024-08-28T17:59:27-04:00</lastmod>
  </url><url>
    <loc>/tags/azure/</loc>
    <lastmod>2024-08-28T17:59:27-04:00</lastmod>
  </url><url>
    <loc>/tags/conditional-access/</loc>
    <lastmod>2024-08-28T17:59:27-04:00</lastmod>
  </url><url>
    <loc>/tags/entra/</loc>
    <lastmod>2024-08-28T17:59:27-04:00</lastmod>
  </url><url>
    <loc>/tags/log-analytics/</loc>
    <lastmod>2024-08-28T17:59:27-04:00</lastmod>
  </url><url>
    <loc>/tags/mfa/</loc>
    <lastmod>2024-08-28T17:59:27-04:00</lastmod>
  </url><url>
    <loc>/tags/phishing/</loc>
    <lastmod>2024-08-28T17:59:27-04:00</lastmod>
  </url><url>
    <loc>/about/</loc>
  </url><url>
    <loc>/categories/</loc>
  </url>
</urlset>
