<?xml version="1.0" encoding="UTF-8"?><urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:news="http://www.google.com/schemas/sitemap-news/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xmlns:video="http://www.google.com/schemas/sitemap-video/1.1"><url><loc>https://websec.net/blog/mobile-pentesting-series-part-2-reversing-android-application-65aa3f2b79788762ba77e586</loc><lastmod>2024-06-29T00:43:51.998Z</lastmod><changefreq>weekly</changefreq><priority>0.9</priority></url><url><loc>https://websec.net/blog/mobile-pentesting-series-part-1-bypass-ssl-pinning-in-android-653bc5a197d6529e40f71f09</loc><lastmod>2024-06-29T00:43:52.040Z</lastmod><changefreq>weekly</changefreq><priority>0.9</priority></url><url><loc>https://websec.net/blog/stun-protocol-ip-exposure-tool-by-websec-64fef9588301f9197619dd51</loc><lastmod>2024-06-29T00:43:52.048Z</lastmod><changefreq>weekly</changefreq><priority>0.9</priority></url><url><loc>https://websec.net/blog/yara-rules-part-2-using-modules-649402237da6efd52bb85631</loc><lastmod>2024-06-29T00:43:52.052Z</lastmod><changefreq>weekly</changefreq><priority>0.9</priority></url><url><loc>https://websec.net/blog/yara-part-1-malware-analysis-for-detecting-iocs-6493fd057da6efd52bb8537f</loc><lastmod>2024-06-29T00:43:52.056Z</lastmod><changefreq>weekly</changefreq><priority>0.9</priority></url><url><loc>https://websec.net/blog/security-development-and-management-jobs-roles-and-responsibilities-647fa646da8f20aeb6846241</loc><lastmod>2024-07-03T01:40:43.871Z</lastmod><changefreq>weekly</changefreq><priority>0.9</priority></url><url><loc>https://websec.net/blog/defensive-security-jobs-roles-and-responsibilities-647fa5a5da8f20aeb68461f5</loc><lastmod>2024-06-29T00:43:52.065Z</lastmod><changefreq>weekly</changefreq><priority>0.9</priority></url><url><loc>https://websec.net/blog/offensive-security-job-titles-roles-and-responsibilities-647fa4b9da8f20aeb6846175</loc><lastmod>2024-06-29T00:43:52.072Z</lastmod><changefreq>weekly</changefreq><priority>0.9</priority></url><url><loc>https://websec.net/blog/malware-analysis-report-magicrat-lazarus-64549b81712404c1b66cc573</loc><lastmod>2024-06-29T00:43:52.078Z</lastmod><changefreq>weekly</changefreq><priority>0.9</priority></url><url><loc>https://websec.net/blog/pgp-encryption-practical-examples-6430fd3761dd339b5487568d</loc><lastmod>2024-06-29T00:43:52.085Z</lastmod><changefreq>weekly</changefreq><priority>0.9</priority></url><url><loc>https://websec.net/blog/static-malware-analysis-office-documents-63c04550f2581a058fc1b461</loc><lastmod>2024-06-29T00:43:52.091Z</lastmod><changefreq>weekly</changefreq><priority>0.9</priority></url><url><loc>https://websec.net/blog/classic-malware-carbanak-part-2-639e8a8ddece7abbe6b579f2</loc><lastmod>2024-09-26T21:13:55.344Z</lastmod><changefreq>weekly</changefreq><priority>0.9</priority></url><url><loc>https://websec.net/blog/malware-analysis-example-classic-case-stuxnet-part-2-639e3181dece7abbe6b55ead</loc><lastmod>2024-09-26T21:02:35.499Z</lastmod><changefreq>weekly</changefreq><priority>0.9</priority></url><url><loc>https://websec.net/blog/reverse-shells-and-cats-netcat-socat-639cc8d4dece7abbe6b4f3ff</loc><lastmod>2024-06-29T00:43:52.108Z</lastmod><changefreq>weekly</changefreq><priority>0.9</priority></url><url><loc>https://websec.net/blog/classic-malware-carbanak-639b6860dece7abbe6b48b8a</loc><lastmod>2024-09-26T21:48:46.339Z</lastmod><changefreq>weekly</changefreq><priority>0.9</priority></url><url><loc>https://websec.net/blog/malware-analysis-example-classic-case-stuxnet-639a1accdece7abbe6b405c6</loc><lastmod>2024-06-29T00:43:52.119Z</lastmod><changefreq>weekly</changefreq><priority>0.9</priority></url><url><loc>https://websec.net/blog/static-malware-analysis-of-pdf-files-6381044f46737a7c2f9ddd17</loc><lastmod>2024-06-29T00:43:52.124Z</lastmod><changefreq>weekly</changefreq><priority>0.9</priority></url><url><loc>https://websec.net/blog/intro-to-static-malware-analysis-636c51ba1e6769027a661c70</loc><lastmod>2024-06-29T00:43:52.134Z</lastmod><changefreq>weekly</changefreq><priority>0.9</priority></url><url><loc>https://websec.net/blog/what-is-dll-hijacking-and-how-does-it-work-636b76dfcc690ab343827516</loc><lastmod>2024-06-29T00:43:52.139Z</lastmod><changefreq>weekly</changefreq><priority>0.9</priority></url><url><loc>https://websec.net/blog/how-to-get-into-cybersecurity-63491602e504f067815a980f</loc><lastmod>2024-07-23T07:46:12.664Z</lastmod><changefreq>weekly</changefreq><priority>0.9</priority></url><url><loc>https://websec.net/blog/top-10-best-security-tools-for-pentesting-6311f24cbd0450b137d09bde</loc><lastmod>2024-06-29T00:43:52.148Z</lastmod><changefreq>weekly</changefreq><priority>0.9</priority></url><url><loc>https://websec.net/blog/5-major-types-of-phishing-attacks-62f00a63c662f0e7d84faecc</loc><lastmod>2024-06-29T00:43:52.153Z</lastmod><changefreq>weekly</changefreq><priority>0.9</priority></url><url><loc>https://websec.net/blog/what-is-phishing-how-it-works-and-how-to-prevent-attacks-629b7ab18bfa00d6ebd6f198</loc><lastmod>2024-06-29T00:43:52.157Z</lastmod><changefreq>weekly</changefreq><priority>0.9</priority></url><url><loc>https://websec.net/blog/what-is-code-review-and-why-is-it-important-625739d2ce485dee4cf34809</loc><lastmod>2024-06-29T00:43:52.161Z</lastmod><changefreq>weekly</changefreq><priority>0.9</priority></url><url><loc>https://websec.net/blog/red-teaming-what-it-is-why-it-matters-and-everything-you-need-to-know-62223242ffdc3946151e78f3</loc><lastmod>2024-06-29T00:43:52.165Z</lastmod><changefreq>weekly</changefreq><priority>0.9</priority></url><url><loc>https://websec.net/blog/what-is-employee-awareness-training-and-why-is-it-important-61fd85cdf8cf0f06a1fdf424</loc><lastmod>2024-06-29T00:43:52.170Z</lastmod><changefreq>weekly</changefreq><priority>0.9</priority></url><url><loc>https://websec.net/blog/what-is-penetration-testing-and-why-is-it-important-61efacad0a50003dff8ff13c</loc><lastmod>2024-06-29T00:43:52.175Z</lastmod><changefreq>weekly</changefreq><priority>0.9</priority></url><url><loc>https://websec.net/blog/how-to-enforce-cybersecurity-best-practices-in-the-remote-work-model-61e5a676e7c0c3e0f62e738d</loc><lastmod>2024-06-29T00:43:52.180Z</lastmod><changefreq>weekly</changefreq><priority>0.9</priority></url><url><loc>https://websec.net/blog/developing-a-remote-code-execution-exploit-for-a-popular-media-box-61b2b37a43a1155c848f3b08</loc><lastmod>2024-06-29T00:43:52.185Z</lastmod><changefreq>weekly</changefreq><priority>0.9</priority></url><url><loc>https://websec.net/blog/twitch-source-code-leaked-615d79f109a2ad03efdb57f8</loc><lastmod>2024-06-29T00:43:52.190Z</lastmod><changefreq>weekly</changefreq><priority>0.9</priority></url><url><loc>https://websec.net/blog/cve-report-august-2021-6127847280e759c7d31286d0</loc><lastmod>2024-06-29T00:43:52.194Z</lastmod><changefreq>weekly</changefreq><priority>0.9</priority></url><url><loc>https://websec.net/blog/dmcacom-hack-full-disclosure-with-proof-of-concept-606ecfec2f798a048269340e</loc><lastmod>2024-06-29T00:43:52.200Z</lastmod><changefreq>weekly</changefreq><priority>0.9</priority></url><url><loc>https://websec.net/blog/an-introductory-guide-to-pentesting-azure-part-1-66151556d3b77dface783b6c</loc><lastmod>2024-06-29T00:43:52.203Z</lastmod><changefreq>weekly</changefreq><priority>0.9</priority></url><url><loc>https://websec.net/blog/hack-zte-routers-admin-panel-66190e773cc251453bda7a0c</loc><lastmod>2024-06-29T00:43:52.207Z</lastmod><changefreq>weekly</changefreq><priority>0.9</priority></url><url><loc>https://websec.net/blog/an-introductory-guide-to-pentesting-azure-benefits-and-tools-part-2-661c326880f704dc4b2bbeca</loc><lastmod>2024-06-29T00:43:52.212Z</lastmod><changefreq>weekly</changefreq><priority>0.9</priority></url><url><loc>https://websec.net/blog/critical-idor-vulnerability-in-latepoint-plugin-exposes-sensitive-data-666b78446e63d6dcdb0f73bf</loc><lastmod>2024-07-02T10:25:55.444Z</lastmod><changefreq>weekly</changefreq><priority>0.9</priority></url><url><loc>https://websec.net/blog/how-to-prepare-for-the-eu-nis2-directive-part-1-6697b739fa7f20b3ca2b8de0</loc><lastmod>2025-02-21T15:10:08.909Z</lastmod><changefreq>weekly</changefreq><priority>0.9</priority></url><url><loc>https://websec.net/blog/attackforge-vs-plextrac-comparison-differences-similarities-and-alternatives-66ad088bac92a30c342d414f</loc><lastmod>2024-08-02T16:54:11.591Z</lastmod><changefreq>weekly</changefreq><priority>0.9</priority></url><url><loc>https://websec.net/blog/enhancing-vulnerability-management-under-nis2-through-coordinated-vulnerability-disclosure-part-2-6702fcda1828340ccbdd5ef6</loc><lastmod>2025-02-21T15:09:44.738Z</lastmod><changefreq>weekly</changefreq><priority>0.9</priority></url><url><loc>https://websec.net/blog/critical-vulnerability-in-vision-helpdesk-allows-unauthorized-session-access-67264646bde7fa99ea26446f</loc><lastmod>2025-02-21T11:16:55.217Z</lastmod><changefreq>weekly</changefreq><priority>0.9</priority></url><url><loc>https://websec.net/blog/the-most-dangerous-application-security-vulnerabilities-of-2024-67a9f7c962832cb4ba345f3a</loc><lastmod>2025-08-01T05:49:09.643Z</lastmod><changefreq>weekly</changefreq><priority>0.9</priority></url><url><loc>https://websec.net/blog/iot-firmware-what-is-it-and-how-does-it-help-you-hack-a-router-67abc9a062832cb4ba345f78</loc><lastmod>2025-04-15T02:35:54.963Z</lastmod><changefreq>weekly</changefreq><priority>0.9</priority></url><url><loc>https://websec.net/blog/research-on-zigbee-security-interference-and-sdr-based-attacks-689c15056dbf416ac56193c5</loc><lastmod>2025-12-09T17:22:42.634Z</lastmod><changefreq>weekly</changefreq><priority>0.9</priority></url><url><loc>https://websec.net/blog/a-deep-dive-into-microsoft-warbird-mss-kernel-mode-dynamic-packer-68ee2c87b251081f55ec8c31</loc><lastmod>2025-10-17T21:38:18.742Z</lastmod><changefreq>weekly</changefreq><priority>0.9</priority></url><url><loc>https://websec.net/blog/ophion-building-a-stealth-intel-vt-x-hypervisor-for-windows-69b62daa7462693131828c97</loc><lastmod>2026-03-16T23:00:38.028Z</lastmod><changefreq>weekly</changefreq><priority>0.9</priority></url><url><loc>https://websec.net/blog/cve-2026-29014-metinfo-cms-unauthenticated-php-code-injection-69cdc290c14a8a99e1f91b7a</loc><lastmod>2026-04-02T09:54:58.228Z</lastmod><changefreq>weekly</changefreq><priority>0.9</priority></url></urlset>