<?xml version="1.0" encoding="utf-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes</loc>
				<priority>1</priority>
				<lastmod>2026-02-19T13:11:25.088Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/fundamentals/learning-process</loc>
				<priority>0.84</priority>
				<lastmod>2026-03-09T04:25:07.472Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/fundamentals/computer-fundamentals</loc>
				<priority>0.84</priority>
				<lastmod>2026-02-21T11:36:01.344Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/fundamentals/network-fundamentals</loc>
				<priority>0.84</priority>
				<lastmod>2026-02-21T08:47:42.449Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/fundamentals/unix-fundamentals</loc>
				<priority>0.84</priority>
				<lastmod>2026-03-16T04:03:10.818Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/fundamentals/hacking-fundamentals</loc>
				<priority>0.84</priority>
				<lastmod>2026-02-18T15:15:56.138Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/fundamentals/hacking-fundamentals/virtual-machine</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-18T05:15:09.814Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/fundamentals/hacking-fundamentals/kali-linux-vs-parrot-security-os</loc>
				<priority>0.7</priority>
				<lastmod>2026-03-18T04:00:07.912Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/fundamentals/hacking-fundamentals/basic-tools</loc>
				<priority>0.7</priority>
				<lastmod>2026-03-18T03:57:57.173Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/fundamentals/hacking-fundamentals/using-ssh</loc>
				<priority>0.7</priority>
				<lastmod>2026-03-18T03:55:12.508Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/fundamentals/hacking-fundamentals/using-tmux</loc>
				<priority>0.7</priority>
				<lastmod>2026-03-18T03:56:44.511Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/fundamentals/hacking-fundamentals/using-vim</loc>
				<priority>0.7</priority>
				<lastmod>2026-03-18T03:57:57.173Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/fundamentals/hacking-fundamentals/network-basics</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-18T06:00:32.708Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/fundamentals/hacking-fundamentals/osint</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-18T06:11:19.533Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/fundamentals/hacking-fundamentals/digital-forensics</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-18T06:18:56.373Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/fundamentals/hacking-fundamentals/phishing-attacks</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-18T06:21:50.539Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/fundamentals/hacking-fundamentals/hardware-attacks</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-18T06:29:29.304Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/fundamentals/hacking-fundamentals/cryptography</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-18T06:38:00.524Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/fundamentals/hacking-fundamentals/password-attacks</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-18T06:55:24.843Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/fundamentals/hacking-fundamentals/wireless-attacks</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-18T07:00:24.075Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/pentesting-cheatsheets/pentesting-cheatsheets</loc>
				<priority>0.84</priority>
				<lastmod>2026-02-28T05:35:31.731Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/pentesting-cheatsheets/sql-injection-and-xss-playground</loc>
				<priority>0.84</priority>
				<lastmod>2026-02-04T15:24:04.944Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/red-team-infrastructure</loc>
				<priority>0.84</priority>
				<lastmod>2026-02-11T13:20:56.266Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/red-team-infrastructure/http-forwarders-relays</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-16T07:52:02.585Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/red-team-infrastructure/smtp-forwarders-relays</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-09T03:49:58.322Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/red-team-infrastructure/phishing-with-modlishka-reverse-http-proxy</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-16T08:07:31.104Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/red-team-infrastructure/automating-red-team-infrastructure-with-terraform</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-16T08:14:05.411Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/red-team-infrastructure/cobalt-strike-101</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-16T08:17:41.347Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/red-team-infrastructure/powershell-empire-101</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-16T08:21:35.326Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/red-team-infrastructure/spiderfoot-101-with-kali-using-docker</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-16T08:23:31.394Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/mitre-att-and-ck</loc>
				<priority>0.84</priority>
				<lastmod>2026-02-09T03:48:31.334Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/initial-access</loc>
				<priority>0.84</priority>
				<lastmod>2026-01-16T08:44:41.102Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/initial-access/phishing-methodology</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-06T09:07:28.745Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/initial-access/password-spraying</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-11T12:11:04.260Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/initial-access/phishing-with-ms-office</loc>
				<priority>0.7</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/initial-access/phishing-with-ms-office/phishing-xlm-macro-4.0</loc>
				<priority>0.59</priority>
				<lastmod>2026-01-16T08:58:24.469Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/initial-access/phishing-with-ms-office/t1173-phishing-dde</loc>
				<priority>0.59</priority>
				<lastmod>2026-01-16T09:07:04.516Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/initial-access/phishing-with-ms-office/t1137-phishing-office-macros</loc>
				<priority>0.59</priority>
				<lastmod>2026-01-16T09:10:18.707Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/initial-access/phishing-with-ms-office/phishing-ole-+-lnk</loc>
				<priority>0.59</priority>
				<lastmod>2026-01-16T09:21:32.874Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/initial-access/phishing-with-ms-office/phishing-embedded-internet-explorer</loc>
				<priority>0.59</priority>
				<lastmod>2026-01-16T10:22:07.918Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/initial-access/phishing-with-ms-office/phishing-.slk-excel</loc>
				<priority>0.59</priority>
				<lastmod>2026-01-16T10:31:15.756Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/initial-access/phishing-with-ms-office/phishing-replacing-embedded-video</loc>
				<priority>0.59</priority>
				<lastmod>2026-01-16T10:34:19.471Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/initial-access/phishing-with-ms-office/inject-macros-from-a-remote-dotm-template</loc>
				<priority>0.59</priority>
				<lastmod>2026-01-16T10:35:48.263Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/initial-access/phishing-with-ms-office/bypassing-parent-child-ancestry-detections</loc>
				<priority>0.59</priority>
				<lastmod>2026-01-16T10:38:48.715Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/initial-access/phishing-with-ms-office/phishing-embedded-html-forms</loc>
				<priority>0.59</priority>
				<lastmod>2026-01-16T10:41:59.948Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/initial-access/phishing-with-gophish-and-digitalocean</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-16T10:45:05.681Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/initial-access/forced-authentication</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-16T10:51:44.972Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/initial-access/netntlmv2-hash-stealing-using-outlook</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-16T10:52:59.652Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/code-execution</loc>
				<priority>0.84</priority>
				<lastmod>2026-02-11T12:20:37.952Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/code-execution/regsvr32</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-09T10:49:43.112Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/code-execution/mshta</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-09T10:51:13.205Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/code-execution/control-panel-item</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-16T11:18:40.976Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/code-execution/executing-code-as-a-control-panel</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-16T11:25:53.938Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/code-execution/code-execution-through-control-panel-add-ins</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-16T11:26:04.640Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/code-execution/cmstp</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-17T04:41:30.618Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/code-execution/installutil</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-17T04:46:29.914Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/code-execution/using-msbuild-to-execute-shellcode-in-c</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-11T12:22:06.068Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/code-execution/forfiles-indirect-command-execution</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-17T04:52:59.963Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/code-execution/application-whitelisting-bypass-with-wmic-and-xsl</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-17T04:56:13.750Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/code-execution/powershell-without-powershell.exe</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-17T05:00:36.618Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/code-execution/powershell-constrained-language-mode-bypass</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-17T05:03:20.940Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/code-execution/forcing-iexplore.exe</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-17T05:04:59.094Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/code-execution/pubprn.vbs-signed-script-code-execution</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-11T12:24:51.350Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/code-and-process-injection</loc>
				<priority>0.84</priority>
				<lastmod>2026-02-11T12:27:22.555Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/code-and-process-injection/createremotethread-shellcode-injection</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-17T07:37:04.990Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/code-and-process-injection/dll-injection</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-17T07:55:39.280Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/code-and-process-injection/reflective-dll-injection</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-17T07:59:23.504Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/code-and-process-injection/shellcode-reflective-dll-injection</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-17T08:01:50.509Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/code-and-process-injection/process-doppelganging</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-17T08:26:05.903Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/code-and-process-injection/loading-and-executing-shellcode-from-pe-resources</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-17T08:27:19.963Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/code-and-process-injection/process-hollowing-and-portable-executable-relocations</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-17T08:35:49.260Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/code-and-process-injection/apc-queue-code-injection</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-17T08:46:43.984Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/code-and-process-injection/early-bird-apc-queue-code-injection</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-17T08:49:06.938Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/code-and-process-injection/shellcode-execution-in-a-local-process</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-17T08:50:41.618Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/code-and-process-injection/shellcode-execution-through-fibers</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-17T08:52:02.707Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/code-and-process-injection/shellcode-execution-via-createthreadpoolwait</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-17T11:26:19.642Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/code-and-process-injection/local-shellcode-execution-without-windows-apis</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-17T11:27:32.534Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/code-and-process-injection/injecting-to-remote-process-via-thread-hijacking</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-11T12:32:10.327Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/code-and-process-injection/setwindowhookex-code-injection</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-17T11:41:57.130Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/code-and-process-injection/finding-kernel32-base-and-function-addresses-in-shellcode</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-17T11:45:39.824Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/code-and-process-injection/executing-shellcode-with-inline-assembly-in-c-c++</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-17T11:48:11.558Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/code-and-process-injection/writing-custom-shellcode-encoders-and-decoders</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-17T11:49:23.337Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/code-and-process-injection/backdooring-pe-files-with-shellcode</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-17T11:54:04.980Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/code-and-process-injection/ntcreatesection-+-ntmapviewofsection-code-injection</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-17T11:57:21.526Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/code-and-process-injection/addressofentrypoint-code-injection-without-virtualallocex-rwx</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-11T12:35:21.128Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/code-and-process-injection/module-stomping-for-shellcode-injection</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-17T12:00:49.751Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/code-and-process-injection/pe-injection-executing-pes-inside-remote-processes</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-17T12:07:41.986Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/code-and-process-injection/api-monitoring-and-hooking-for-offensive-tooling</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-17T12:11:50.365Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/code-and-process-injection/windows-api-hooking</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-17T12:14:16.183Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/code-and-process-injection/import-address-table-iat-hooking</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-11T12:37:26.780Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/code-and-process-injection/dll-injection-via-a-custom-.net-garbage-collector</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-17T12:26:24.816Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/code-and-process-injection/writing-and-compiling-shellcode-in-c</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-17T12:29:25.297Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/code-and-process-injection/injecting-.net-assembly-to-an-unmanaged-process</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-17T12:32:36.914Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/code-and-process-injection/binary-exploitation</loc>
				<priority>0.7</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/code-and-process-injection/binary-exploitation/32-bit-stack-based-buffer-overflow</loc>
				<priority>0.59</priority>
				<lastmod>2026-01-17T12:42:09.900Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/code-and-process-injection/binary-exploitation/64-bit-stack-based-buffer-overflow</loc>
				<priority>0.59</priority>
				<lastmod>2026-01-17T12:47:33.682Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/code-and-process-injection/binary-exploitation/return-to-libc-ret2libc</loc>
				<priority>0.59</priority>
				<lastmod>2026-01-17T12:47:33.682Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/code-and-process-injection/binary-exploitation/rop-chaining-return-oriented-programming</loc>
				<priority>0.59</priority>
				<lastmod>2026-01-17T12:53:26.277Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/code-and-process-injection/binary-exploitation/seh-based-buffer-overflow</loc>
				<priority>0.59</priority>
				<lastmod>2026-01-17T12:59:13.118Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/code-and-process-injection/binary-exploitation/format-string-bug</loc>
				<priority>0.59</priority>
				<lastmod>2026-01-17T13:05:50.247Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/defense-evasion</loc>
				<priority>0.84</priority>
				<lastmod>2026-02-11T12:42:16.642Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/defense-evasion/av-bypass-with-metasploit-templates-and-custom-binaries</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-19T02:33:01.351Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/defense-evasion/evading-windows-defender-with-1-byte-change</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-19T02:38:06.995Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/defense-evasion/bypassing-windows-defender-one-tcp-socket-away-from-meterpreter-and-beacon-sessions</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-19T02:39:36.327Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/defense-evasion/bypassing-cylance-and-other-avs-edrs-by-unhooking-windows-apis</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-19T02:48:23.263Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/defense-evasion/windows-api-hashing-in-malware</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-19T02:48:23.263Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/defense-evasion/detecting-hooked-syscalls</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-19T02:56:41.049Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/defense-evasion/calling-syscalls-directly-from-visual-studio-to-bypass-avs-edrs</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-19T03:04:50.510Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/defense-evasion/retrieving-ntdll-syscall-stubs-from-disk-at-run-time</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-19T03:06:29.892Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/defense-evasion/full-dll-unhooking-with-c++</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-19T03:10:24.504Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/defense-evasion/enumerating-rwx-protected-memory-regions-for-code-injection</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-19T03:10:24.504Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/defense-evasion/disabling-windows-event-logs-by-suspending-eventlog-service-threads</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-19T03:11:53.395Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/defense-evasion/obfuscated-powershell-invocations</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-19T03:13:28.885Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/defense-evasion/masquerading-processes-in-userland-via-_peb</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-19T03:28:04.558Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/defense-evasion/commandline-obfusaction</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-19T03:31:56.201Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/defense-evasion/file-smuggling-with-html-and-javascript</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-19T03:33:44.017Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/defense-evasion/timestomping</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-19T03:36:31.326Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/defense-evasion/alternate-data-streams</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-19T03:36:31.326Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/defense-evasion/hidden-files</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-19T03:39:03.757Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/defense-evasion/encode-decode-data-with-certutil</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-19T03:40:05.255Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/defense-evasion/downloading-files-with-certutil</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-19T03:42:58.068Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/defense-evasion/packed-binaries</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-19T03:44:48.001Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/defense-evasion/unloading-sysmon-driver</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-19T03:45:53.059Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/defense-evasion/bypassing-ids-signatures-with-simple-reverse-shells</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-19T03:45:53.059Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/defense-evasion/preventing-3rd-party-dlls-from-injecting-into-your-malware</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-19T03:48:45.766Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/defense-evasion/processdynamiccodepolicy-arbitrary-code-guard-acg</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-19T03:51:24.585Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/defense-evasion/parent-process-id-ppid-spoofing</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-11T12:47:58.613Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/defense-evasion/executing-c-assemblies-from-jscript-and-wscript-with-dotnettojscript</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-19T03:54:25.672Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/enumeration-and-discovery</loc>
				<priority>0.84</priority>
				<lastmod>2026-02-11T12:50:12.899Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/enumeration-and-discovery/windows-event-ids-and-others-for-situational-awareness</loc>
				<priority>0.7</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/enumeration-and-discovery/enumerating-com-objects-and-their-methods</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-19T10:47:36.619Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/enumeration-and-discovery/enumerating-users-without-net-services-without-sc-and-scheduled-tasks-without-schtasks</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-19T10:49:06.701Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/enumeration-and-discovery/enumerating-windows-domains-with-rpcclient-through-socksproxy-bypassing-command-line-logging</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-19T10:51:42.875Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/enumeration-and-discovery/dump-global-address-list-gal-from-owa</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-19T10:53:51.544Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/enumeration-and-discovery/application-window-discovery</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-19T10:53:51.544Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/enumeration-and-discovery/account-discovery-and-enumeration</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-19T10:55:44.517Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/enumeration-and-discovery/using-com-to-enumerate-hostname-username-domain-network-drives</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-19T10:55:44.517Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/enumeration-and-discovery/detecting-sysmon-on-the-victim-host</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-19T10:58:52.576Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/privilege-escalation</loc>
				<priority>0.84</priority>
				<lastmod>2026-02-11T12:56:48.722Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/privilege-escalation/primary-access-token-manipulation</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-19T11:13:35.203Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/privilege-escalation/windows-namedpipes-101-+-privilege-escalation</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-19T11:14:38.461Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/privilege-escalation/dll-hijacking</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-19T11:16:08.492Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/privilege-escalation/webshells</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-19T11:17:13.477Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/privilege-escalation/image-file-execution-options-injection</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-19T11:19:27.725Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/privilege-escalation/unquoted-service-paths</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-19T11:19:27.725Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/privilege-escalation/pass-the-hash-privilege-escalation-with-invoke-wmiexec</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-19T11:21:48.690Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/privilege-escalation/environment-variable-usdpath-interception</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-19T11:21:48.690Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/privilege-escalation/weak-service-permissions</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-19T11:22:59.317Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/credential-access-and-dumping</loc>
				<priority>0.84</priority>
				<lastmod>2026-02-11T12:59:33.776Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/credential-access-and-dumping/dumping-credentials-from-lsass-process-memory-with-mimikatz</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-19T15:01:13.335Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/credential-access-and-dumping/dumping-lsass-without-mimikatz</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-19T15:05:36.639Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/credential-access-and-dumping/dumping-lsass-without-mimikatz-with-minidumpwritedump</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-19T15:11:07.530Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/credential-access-and-dumping/dumping-hashes-from-sam-via-registry</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-19T15:12:11.350Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/credential-access-and-dumping/dumping-sam-via-esentutl.exe</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-19T15:17:27.334Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/credential-access-and-dumping/dumping-lsa-secrets</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-19T15:23:15.574Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/credential-access-and-dumping/dumping-and-cracking-mscash-cached-domain-credentials</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-19T15:25:56.394Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/credential-access-and-dumping/dumping-domain-controller-hashes-locally-and-remotely</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-19T15:29:41.944Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/credential-access-and-dumping/dumping-domain-controller-hashes-via-wmic-and-vssadmin-shadow-copy</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-19T15:29:41.944Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/credential-access-and-dumping/network-vs-interactive-logons</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-19T15:30:42.798Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/credential-access-and-dumping/reading-dpapi-encrypted-secrets-with-mimikatz-and-c++</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-20T11:31:22.602Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/credential-access-and-dumping/credentials-in-registry</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-20T11:32:30.343Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/credential-access-and-dumping/password-filter</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-20T11:33:56.970Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/credential-access-and-dumping/forcing-wdigest-to-store-credentials-in-plaintext</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-20T11:33:56.970Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/credential-access-and-dumping/dumping-delegated-default-kerberos-and-ntlm-credentials-w-o-touching-lsass</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-20T11:36:09.404Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/credential-access-and-dumping/intercepting-logon-credentials-via-custom-security-support-provider-and-authentication-packages</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-20T11:38:19.212Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/credential-access-and-dumping/pulling-web-application-passwords-by-hooking-html-input-fields</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-20T11:38:19.212Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/credential-access-and-dumping/intercepting-logon-credentials-by-hooking-msv1_0-spacceptcredentials</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-20T11:39:27.663Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/credential-access-and-dumping/credentials-collection-via-creduipromptforcredentials</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-20T11:41:34.833Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/lateral-movement</loc>
				<priority>0.84</priority>
				<lastmod>2026-02-11T13:07:26.476Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/lateral-movement/winrm-for-lateral-movement</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-20T15:19:50.520Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/lateral-movement/winrs-for-lateral-movement</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-20T15:24:47.139Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/lateral-movement/wmi-for-lateral-movement</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-20T15:29:09.345Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/lateral-movement/rdp-hijacking-for-lateral-movement-with-tscon</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-21T05:43:08.476Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/lateral-movement/shared-webroot</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-21T10:40:33.979Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/lateral-movement/lateral-movement-via-dcom</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-21T10:43:00.594Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/lateral-movement/wmi-+-msi-lateral-movement</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-11T13:09:20.086Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/lateral-movement/lateral-movement-via-service-configuration-manager</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-21T10:44:36.404Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/lateral-movement/lateral-movement-via-smb-relaying</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-21T10:50:06.294Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/lateral-movement/wmi-+-newscheduledtaskaction-lateral-movement</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-21T14:54:23.185Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/lateral-movement/wmi-+-powershell-desired-state-configuration-lateral-movement</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-21T15:01:05.942Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/lateral-movement/simple-tcp-relaying-with-netcat</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-21T15:01:05.942Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/lateral-movement/empire-shells-with-netnltmv2-relaying</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-21T15:02:12.279Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/lateral-movement/lateral-movement-with-psexec</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-21T15:04:09.404Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/lateral-movement/from-beacon-to-interactive-rdp-session</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-21T15:04:09.404Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/lateral-movement/ssh-tunnelling-port-forwarding</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-21T15:05:51.497Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/lateral-movement/lateral-movement-via-wmi-event-subscription</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-21T15:09:36.666Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/lateral-movement/lateral-movement-via-dll-hijacking</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-21T15:11:44.088Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/lateral-movement/lateral-movement-over-headless-rdp-with-sharprdp</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-21T15:13:01.950Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/lateral-movement/man-in-the-browser-via-chrome-extension</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-21T15:14:04.741Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/lateral-movement/shadowmove-lateral-movement-by-duplicating-existing-sockets</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-21T15:18:45.267Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/persistence</loc>
				<priority>0.84</priority>
				<lastmod>2026-02-11T13:10:35.285Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/persistence/dll-proxying-for-persistence</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-22T00:22:07.247Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/persistence/schtask</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-22T00:25:15.767Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/persistence/service-execution</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-22T00:25:15.767Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/persistence/sticky-keys</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-22T00:27:45.913Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/persistence/create-account</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-22T00:29:29.252Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/persistence/addmonitor</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-22T00:35:07.959Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/persistence/netsh-helper-dll</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-22T05:22:01.657Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/persistence/abusing-windows-managent-instrumentation</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-22T05:26:35.311Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/persistence/abusing-windows-managent-instrumentation/wmi-as-a-data-storage</loc>
				<priority>0.59</priority>
				<lastmod>2026-01-22T05:26:35.311Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/persistence/windows-logon-helper</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-22T05:29:09.875Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/persistence/hijacking-default-file-extension</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-22T05:30:47.616Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/persistence/persisting-in-svchost.exe-with-a-service-dll</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-22T05:30:47.616Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/persistence/modifying-.lnk-shortcuts</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-22T05:32:30.809Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/persistence/screensaver-hijack</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-22T05:32:30.809Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/persistence/application-shimming</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-22T05:34:11.827Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/persistence/bits-jobs</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-22T05:35:41.985Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/persistence/com-hijacking</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-22T05:36:54.105Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/persistence/sip-and-trust-provider-hijacking</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-22T11:00:38.180Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/persistence/hijacking-time-providers</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-22T11:05:55.224Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/persistence/installing-root-certificate</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-22T11:07:16.269Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/persistence/powershell-profile-persistence</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-22T11:09:06.602Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/persistence/rid-hijacking</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-22T11:10:17.424Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/persistence/word-library-add-ins</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-22T11:10:17.424Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/persistence/office-templates</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-22T11:12:25.212Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/exfiltration</loc>
				<priority>0.84</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/offensive-security/exfiltration/powershell-payload-delivery-via-dns-using-invoke-powercloud</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-22T11:16:50.323Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/active-directory/active-directory-and-kerberos-abuse</loc>
				<priority>0.84</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/active-directory/active-directory-and-kerberos-abuse/active-directory-and-kerberos-abuse</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-11T13:27:56.998Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/active-directory/active-directory-and-kerberos-abuse/from-domain-admin-to-enterprise-admin</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-14T05:23:05.662Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/active-directory/active-directory-and-kerberos-abuse/kerberoasting</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-14T05:40:57.583Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/active-directory/active-directory-and-kerberos-abuse/kerberos-golden-tickets</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-14T05:45:30.738Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/active-directory/active-directory-and-kerberos-abuse/kerberos-silver-tickets</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-14T05:51:37.910Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/active-directory/active-directory-and-kerberos-abuse/as-rep-roasting</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-14T05:54:35.739Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/active-directory/active-directory-and-kerberos-abuse/kerberoasting-requesting-rc4-encrypted-tgs-when-aes-is-enabled</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-14T05:57:01.316Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/active-directory/active-directory-and-kerberos-abuse/kerberos-unconstrained-delegation</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-14T06:02:04.517Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/active-directory/active-directory-and-kerberos-abuse/kerberos-constrained-delegation</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-14T06:08:27.725Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/active-directory/active-directory-and-kerberos-abuse/kerberos-resource-based-constrained-delegation-computer-object-takeover</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-14T10:32:29.498Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/active-directory/active-directory-and-kerberos-abuse/domain-compromise-via-dc-print-server-and-kerberos-delegation</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-14T10:39:27.225Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/active-directory/active-directory-and-kerberos-abuse/dcshadow-becoming-a-rogue-domain-controller</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-14T10:46:31.808Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/active-directory/active-directory-and-kerberos-abuse/dcsync-dump-password-hashes-from-domain-controller</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-14T10:50:08.093Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/active-directory/active-directory-and-kerberos-abuse/powerview-active-directory-enumeration</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-14T10:51:33.820Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/active-directory/active-directory-and-kerberos-abuse/abusing-active-directory-acls-aces</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-14T14:55:10.112Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/active-directory/active-directory-and-kerberos-abuse/privileged-accounts-and-token-privileges</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-14T15:00:49.956Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/active-directory/active-directory-and-kerberos-abuse/from-dnsadmins-to-system-to-domain-compromise</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-15T00:41:22.833Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/active-directory/active-directory-and-kerberos-abuse/pass-the-hash-with-machineusd-accounts</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-15T05:25:44.382Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/active-directory/active-directory-and-kerberos-abuse/bloodhound-with-kali-linux-101</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-15T05:35:39.760Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/active-directory/active-directory-and-kerberos-abuse/backdooring-adminsdholder-for-persistence</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-15T05:39:32.975Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/active-directory/active-directory-and-kerberos-abuse/active-directory-enumeration-with-ad-module-without-rsat-or-admin-privileges</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-15T15:15:53.087Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/active-directory/active-directory-and-kerberos-abuse/enumerating-ad-object-permissions-with-dsacls</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-15T14:40:49.512Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/active-directory/active-directory-and-kerberos-abuse/active-directory-password-spraying</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-15T14:46:30.649Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/active-directory/active-directory-and-kerberos-abuse/active-directory-lab-with-hyper-v-and-powershell</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-15T15:16:58.630Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/active-directory/active-directory-and-kerberos-abuse/adcs-+-petitpotam-ntlm-relay-obtaining-krbtgt-hash-with-domain-controller-machine-certificate</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-15T15:03:46.049Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/active-directory/active-directory-and-kerberos-abuse/from-misconfigured-certificate-template-to-domain-admin</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-15T15:07:39.278Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/active-directory/active-directory-and-kerberos-abuse/shadow-credentials</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-15T15:09:30.140Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/active-directory/active-directory-and-kerberos-abuse/abusing-trust-accountusd-accessing-resources-on-a-trusted-domain-from-a-trusting-domain</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-15T15:12:15.784Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/reversing-forensics-and-misc/internals</loc>
				<priority>0.84</priority>
				<lastmod>2026-02-11T13:30:08.496Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/reversing-forensics-and-misc/internals/configuring-kernel-debugging-environment-with-kdnet-and-windbg-preview</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-22T11:28:20.752Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/reversing-forensics-and-misc/internals/compiling-a-simple-kernel-driver-dbgprint-dbgview</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-22T11:31:27.672Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/reversing-forensics-and-misc/internals/loading-windows-kernel-driver-for-debugging</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-22T11:32:29.444Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/reversing-forensics-and-misc/internals/subscribing-to-process-creation-thread-creation-and-image-load-notifications-from-a-kernel-driver</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-22T11:36:39.653Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/reversing-forensics-and-misc/internals/listing-open-handles-and-finding-kernel-object-addresses</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-22T11:40:50.111Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/reversing-forensics-and-misc/internals/sending-commands-from-your-userland-program-to-your-kernel-driver-using-ioctl</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-22T11:43:49.408Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/reversing-forensics-and-misc/internals/windows-kernel-drivers-101</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-22T11:45:10.982Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/reversing-forensics-and-misc/internals/windows-x64-calling-convention-stack-frame</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-22T11:47:08.024Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/reversing-forensics-and-misc/internals/linux-x64-calling-convention-stack-frame</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-22T11:49:04.050Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/reversing-forensics-and-misc/internals/system-service-descriptor-table-ssdt</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-22T11:50:59.637Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/reversing-forensics-and-misc/internals/interrupt-descriptor-table-idt</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-22T11:55:54.317Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/reversing-forensics-and-misc/internals/token-abuse-for-privilege-escalation-in-kernel</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-22T14:55:46.703Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/reversing-forensics-and-misc/internals/manipulating-activeprocesslinks-to-hide-processes-in-userland</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-22T14:57:21.095Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/reversing-forensics-and-misc/internals/etw-event-tracing-for-windows-101</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-22T14:58:30.355Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/reversing-forensics-and-misc/internals/exploring-injected-threads</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-22T15:00:27.176Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/reversing-forensics-and-misc/internals/parsing-pe-file-headers-with-c++</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-22T15:03:24.795Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/reversing-forensics-and-misc/internals/instrumenting-windows-apis-with-frida</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-22T15:05:31.691Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/reversing-forensics-and-misc/internals/exploring-process-environment-block</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-22T15:10:16.240Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/reversing-forensics-and-misc/internals/writing-a-custom-bootloader</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-22T15:14:32.611Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/reversing-forensics-and-misc/aws-accounts-users-groups-roles-policies</loc>
				<priority>0.84</priority>
				<lastmod>2026-01-22T11:25:23.019Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/reversing-forensics-and-misc/neo4j</loc>
				<priority>0.84</priority>
				<lastmod>2026-01-22T15:16:27.154Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/reversing-forensics-and-misc/dump-virtual-box-memory</loc>
				<priority>0.84</priority>
				<lastmod>2026-01-22T15:17:29.895Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/reversing-forensics-and-misc/aes-encryption-using-crypto++</loc>
				<priority>0.84</priority>
				<lastmod>2026-01-22T15:19:32.518Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/reversing-forensics-and-misc/reversing-password</loc>
				<priority>0.84</priority>
				<lastmod>2026-01-22T15:20:42.846Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/hacking-manuel/hacking-methodology</loc>
				<priority>0.84</priority>
				<lastmod>2026-02-28T06:11:07.722Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/hacking-manuel/hacking-methodology/pre-engagement</loc>
				<priority>0.7</priority>
				<lastmod>2026-03-10T06:03:57.932Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/hacking-manuel/pentesting-web-checklist</loc>
				<priority>0.84</priority>
				<lastmod>2026-02-03T06:06:44.012Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/hacking-manuel/pentesting-web-checklist/methodology</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-03T05:37:22.852Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/hacking-manuel/pentesting-web-checklist/web-security-testing-guide-checklist</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-04T06:17:03.337Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/reconnaissance/osint</loc>
				<priority>0.84</priority>
				<lastmod>2026-02-11T03:01:08.883Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/reconnaissance/osint/osint-open-source-intelligence</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-12T08:11:14.333Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/reconnaissance/osint/github-dorks</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-12T08:12:36.973Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/reconnaissance/osint/google-dorks</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-12T08:13:46.845Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/reconnaissance/osint/imint-image-intelligence-and-geoint-geospatial-intelligence</loc>
				<priority>0.7</priority>
				<lastmod>2026-03-09T11:56:27.236Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/reconnaissance/public-info-gathering</loc>
				<priority>0.84</priority>
				<lastmod>2026-02-04T15:30:29.020Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/reconnaissance/basic-recon</loc>
				<priority>0.84</priority>
				<lastmod>2026-02-12T08:03:12.570Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/reconnaissance/root-domains</loc>
				<priority>0.84</priority>
				<lastmod>2026-01-24T05:41:47.307Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/reconnaissance/subdomain-enum</loc>
				<priority>0.84</priority>
				<lastmod>2026-02-12T08:17:01.436Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/reconnaissance/subdomain-enum/subdomain-takeover</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-12T08:18:11.080Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/reconnaissance/dns-domain-name-systems-pentesting</loc>
				<priority>0.84</priority>
				<lastmod>2026-03-11T02:49:23.360Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/reconnaissance/mdns-multicast-dns-pentesting</loc>
				<priority>0.84</priority>
				<lastmod>2026-03-09T11:50:48.261Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/reconnaissance/port-scan</loc>
				<priority>0.84</priority>
				<lastmod>2026-02-12T08:06:13.374Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/reconnaissance/network-scanning</loc>
				<priority>0.84</priority>
				<lastmod>2026-01-24T06:20:09.016Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/reconnaissance/host-scanning</loc>
				<priority>0.84</priority>
				<lastmod>2026-01-24T06:25:42.872Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/reconnaissance/packet-scanning</loc>
				<priority>0.84</priority>
				<lastmod>2026-01-24T06:25:42.872Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/reconnaissance/find-leaked-api-keys</loc>
				<priority>0.84</priority>
				<lastmod>2026-02-12T08:04:35.082Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/reconnaissance/email-analysis</loc>
				<priority>0.84</priority>
				<lastmod>2026-02-12T08:08:48.678Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/reconnaissance/webs-recon</loc>
				<priority>0.84</priority>
				<lastmod>2026-02-04T15:30:29.020Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/reconnaissance/web-basic-pentesting</loc>
				<priority>0.84</priority>
				<lastmod>2026-02-13T08:08:04.680Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/reconnaissance/windows-forensics</loc>
				<priority>0.84</priority>
				<lastmod>2026-03-09T11:52:49.112Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/reconnaissance/windows-forensics/onedrive-logs</loc>
				<priority>0.7</priority>
				<lastmod>2026-03-09T11:55:02.105Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/reconnaissance/active-directory-pentesting</loc>
				<priority>0.84</priority>
				<lastmod>2026-02-14T04:36:09.223Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/reconnaissance/ad-cs-active-directory-certificate-services-pentesting</loc>
				<priority>0.84</priority>
				<lastmod>2026-03-09T11:52:49.085Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/reconnaissance/cloud-info-gathering</loc>
				<priority>0.84</priority>
				<lastmod>2026-03-09T11:53:49.823Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/reconnaissance/dark-web-search</loc>
				<priority>0.84</priority>
				<lastmod>2026-02-17T04:18:22.716Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/reconnaissance/social-engineering</loc>
				<priority>0.84</priority>
				<lastmod>2026-02-17T04:44:15.908Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/information-gathering</loc>
				<priority>0.84</priority>
				<lastmod>2026-03-11T02:46:27.096Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/information-gathering/service-enumeration</loc>
				<priority>0.7</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/information-gathering/service-enumeration/services</loc>
				<priority>0.59</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/information-gathering/service-enumeration/services/ftp-21</loc>
				<priority>0.5</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/information-gathering/service-enumeration/services/ftp-21/dangerous-settings</loc>
				<priority>0.42</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/information-gathering/service-enumeration/services/ssh-22</loc>
				<priority>0.5</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/information-gathering/service-enumeration/services/ssh-22/authentication</loc>
				<priority>0.42</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/information-gathering/service-enumeration/services/ssh-22/dangerous-settings</loc>
				<priority>0.42</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/information-gathering/service-enumeration/services/smtp-25-465-587</loc>
				<priority>0.5</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/information-gathering/service-enumeration/services/smtp-25-465-587/common-commands</loc>
				<priority>0.42</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/information-gathering/service-enumeration/services/dns-53</loc>
				<priority>0.5</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/information-gathering/service-enumeration/services/dns-53/records-types</loc>
				<priority>0.42</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/information-gathering/service-enumeration/services/dns-53/dangerous-setttings</loc>
				<priority>0.42</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/information-gathering/service-enumeration/services/tfpt-69</loc>
				<priority>0.5</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/information-gathering/service-enumeration/services/kerberos-88</loc>
				<priority>0.5</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/information-gathering/service-enumeration/services/pop3-110-995</loc>
				<priority>0.5</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/information-gathering/service-enumeration/services/pop3-110-995/commands</loc>
				<priority>0.42</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/information-gathering/service-enumeration/services/pop3-110-995/dangerous-settings</loc>
				<priority>0.42</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/information-gathering/service-enumeration/services/imap-143-993</loc>
				<priority>0.5</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/information-gathering/service-enumeration/services/imap-143-993/commands</loc>
				<priority>0.42</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/information-gathering/service-enumeration/services/smb-139-445</loc>
				<priority>0.5</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/information-gathering/service-enumeration/services/smb-139-445/windows-specfic</loc>
				<priority>0.42</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/information-gathering/service-enumeration/services/smb-139-445/spidering</loc>
				<priority>0.42</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/information-gathering/service-enumeration/services/smb-139-445/rpcclients</loc>
				<priority>0.42</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/information-gathering/service-enumeration/services/smb-139-445/dangerous-settings</loc>
				<priority>0.42</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/information-gathering/service-enumeration/services/snmp-161-162-10161-10162</loc>
				<priority>0.5</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/information-gathering/service-enumeration/services/snmp-161-162-10161-10162/dangerous-settings</loc>
				<priority>0.42</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/information-gathering/service-enumeration/services/r-service-512-513-514</loc>
				<priority>0.5</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/information-gathering/service-enumeration/services/r-service-512-513-514/service-breakdown</loc>
				<priority>0.42</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/information-gathering/service-enumeration/services/ipmi-623</loc>
				<priority>0.5</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/information-gathering/service-enumeration/services/ipmi-623/authentication</loc>
				<priority>0.42</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/information-gathering/service-enumeration/services/ipmi-623/default-credentials</loc>
				<priority>0.42</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/information-gathering/service-enumeration/services/rsync-873</loc>
				<priority>0.5</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/information-gathering/service-enumeration/services/mssql-1433-1433-2433</loc>
				<priority>0.5</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/information-gathering/service-enumeration/services/mssql-1433-1433-2433/t-sql-commands</loc>
				<priority>0.42</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/information-gathering/service-enumeration/services/mssql-1433-1433-2433/dangerous-settings</loc>
				<priority>0.42</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/information-gathering/service-enumeration/services/oracle-tns-1521</loc>
				<priority>0.5</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/information-gathering/service-enumeration/services/oracle-tns-1521/sqlplus-commands</loc>
				<priority>0.42</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/information-gathering/service-enumeration/services/oracle-tns-1521/troublshooting</loc>
				<priority>0.42</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/information-gathering/service-enumeration/services/nfs-2049</loc>
				<priority>0.5</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/information-gathering/service-enumeration/services/nfs-2049/dangerous-settings</loc>
				<priority>0.42</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/information-gathering/service-enumeration/services/mysql-3306</loc>
				<priority>0.5</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/information-gathering/service-enumeration/services/mysql-3306/basic-sql-queries</loc>
				<priority>0.42</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/information-gathering/service-enumeration/services/mysql-3306/dangerous-settings</loc>
				<priority>0.42</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/information-gathering/service-enumeration/services/rdp-3389</loc>
				<priority>0.5</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/information-gathering/service-enumeration/services/winrm-5985-5986</loc>
				<priority>0.5</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/information-gathering/service-enumeration/tools</loc>
				<priority>0.59</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/information-gathering/service-enumeration/tools/nmap</loc>
				<priority>0.5</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/information-gathering/service-enumeration/tools/nmap/host-discovery</loc>
				<priority>0.42</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/information-gathering/service-enumeration/tools/nmap/port-scanning</loc>
				<priority>0.42</priority>
				<lastmod>2026-03-14T07:04:33.489Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/information-gathering/service-enumeration/tools/nmap/saving-output</loc>
				<priority>0.42</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/information-gathering/service-enumeration/tools/nmap/scripts</loc>
				<priority>0.42</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/information-gathering/service-enumeration/tools/nmap/firewall-and-ids-ips-evasion</loc>
				<priority>0.42</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/information-gathering/service-enumeration/tools/nmap/options</loc>
				<priority>0.42</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/information-gathering/service-enumeration/tools/tcpdump</loc>
				<priority>0.5</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/information-gathering/service-enumeration/tools/wmiexec</loc>
				<priority>0.5</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/information-gathering/service-enumeration/tools/creds</loc>
				<priority>0.5</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/information-gathering/web-enumeration</loc>
				<priority>0.7</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/information-gathering/web-enumeration/passive</loc>
				<priority>0.59</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/information-gathering/web-enumeration/passive/passive-subdomain-enumeration</loc>
				<priority>0.5</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/information-gathering/web-enumeration/passive/passive-infrastructure-identofication</loc>
				<priority>0.5</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/information-gathering/web-enumeration/passive/google-dorking</loc>
				<priority>0.5</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/information-gathering/web-enumeration/active</loc>
				<priority>0.59</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/information-gathering/web-enumeration/active/web-server-enumeration</loc>
				<priority>0.5</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/information-gathering/web-enumeration/active/directiory-and-page-fuzzing</loc>
				<priority>0.5</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/information-gathering/web-enumeration/active/subdomain-and-virtual-host-fuzzing</loc>
				<priority>0.5</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/information-gathering/web-enumeration/active/parameter-and-value-fuzzing</loc>
				<priority>0.5</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/information-gathering/web-enumeration/tools</loc>
				<priority>0.59</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/information-gathering/web-enumeration/tools/eyewitness</loc>
				<priority>0.5</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/information-gathering/application-enumeration</loc>
				<priority>0.7</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/information-gathering/application-enumeration/wordpress</loc>
				<priority>0.59</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/information-gathering/application-enumeration/joomla</loc>
				<priority>0.59</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/information-gathering/application-enumeration/drupal</loc>
				<priority>0.59</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/information-gathering/application-enumeration/tomcat</loc>
				<priority>0.59</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/information-gathering/application-enumeration/jenkins</loc>
				<priority>0.59</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/information-gathering/application-enumeration/splunk</loc>
				<priority>0.59</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/information-gathering/application-enumeration/prtg-network-monitor</loc>
				<priority>0.59</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/information-gathering/application-enumeration/osticket</loc>
				<priority>0.59</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/information-gathering/application-enumeration/gitlab</loc>
				<priority>0.59</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/information-gathering/application-enumeration/coldfusion</loc>
				<priority>0.59</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/information-gathering/application-enumeration/iis-tilde-enumeration</loc>
				<priority>0.59</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/information-gathering/active-directory-enumeration</loc>
				<priority>0.7</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/information-gathering/active-directory-enumeration/host-enumeration</loc>
				<priority>0.59</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/information-gathering/active-directory-enumeration/user-enumeration</loc>
				<priority>0.59</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/information-gathering/active-directory-enumeration/user-enumeration/without-access</loc>
				<priority>0.5</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/information-gathering/active-directory-enumeration/user-enumeration/with-access</loc>
				<priority>0.5</priority>
				<lastmod>2026-03-14T08:39:09.342Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/information-gathering/active-directory-enumeration/smb-enumeration</loc>
				<priority>0.59</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/information-gathering/active-directory-enumeration/password-policy-enumeartion</loc>
				<priority>0.59</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/information-gathering/active-directory-enumeration/enumeartion-security-controls</loc>
				<priority>0.59</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/information-gathering/active-directory-enumeration/acl-enumeration</loc>
				<priority>0.59</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/information-gathering/active-directory-enumeration/tools</loc>
				<priority>0.59</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/information-gathering/active-directory-enumeration/tools/bloodhound</loc>
				<priority>0.5</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/information-gathering/active-directory-enumeration/tools/bloodhound/analysis</loc>
				<priority>0.42</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/information-gathering/active-directory-enumeration/tools/powerview</loc>
				<priority>0.5</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/files</loc>
				<priority>0.84</priority>
				<lastmod>2026-02-05T05:23:25.452Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/ssl-tls</loc>
				<priority>0.84</priority>
				<lastmod>2026-01-24T06:33:46.923Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/ports</loc>
				<priority>0.84</priority>
				<lastmod>2026-01-24T07:00:33.851Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/web-app-technologies</loc>
				<priority>0.84</priority>
				<lastmod>2026-01-24T08:31:02.932Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/web-app-technologies/apache-activemq-pentesting</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-13T08:11:05.071Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/web-app-technologies/apache-tomcat-pentesting</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-13T08:12:23.570Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/web-app-technologies/apache-zeppelin-pentesting</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-13T08:13:30.262Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/web-app-technologies/api-pentesting</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-13T08:15:35.641Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/web-app-technologies/atlassian-confluence-pentesting</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-13T08:17:08.512Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/web-app-technologies/cacti-pentesting</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-13T08:32:09.080Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/web-app-technologies/cgi-pentesting</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-13T08:38:35.503Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/web-app-technologies/codiad-pentesting</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-13T08:43:27.977Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/web-app-technologies/clipbucket-pentesting</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-13T08:42:02.729Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/web-app-technologies/dompdf-rce</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-13T09:04:43.053Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/web-app-technologies/dump-git-repository-from-website</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-13T09:08:53.651Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/web-app-technologies/ghostscript-pentesting</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-13T09:24:16.435Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/web-app-technologies/graphql-pentesting</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-13T09:32:22.355Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/web-app-technologies/icinga-web-pentesting</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-13T09:40:27.272Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/web-app-technologies/jboss-pentesting</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-13T09:49:35.047Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/web-app-technologies/json.net-deserialization</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-13T09:48:24.410Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/web-app-technologies/latex-injection</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-13T09:56:01.359Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/web-app-technologies/limesurvey-pentesting</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-13T09:59:15.836Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/web-app-technologies/llm-chatbot-pentesting</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-13T09:59:15.836Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/web-app-technologies/log4j-pentesting</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-13T10:02:17.482Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/web-app-technologies/microsoft-exchange-server-pentesting</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-13T10:02:17.482Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/web-app-technologies/node.js-deserialization</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-13T10:05:09.591Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/web-app-technologies/opencats-pentesting</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-13T10:15:51.062Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/web-app-technologies/restaurant-management-system-rms-pentesting</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-13T10:30:27.235Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/web-app-technologies/teamcity-pentesting</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-13T10:47:45.138Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/web-app-technologies/tiny-file-manager</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-13T10:47:45.050Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/web-app-technologies/webdav-pentesting</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-13T11:04:08.901Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/web-app-technologies/webmin-pentesting</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-13T11:04:08.901Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/web-app-technologies/wkhtmltopdf-ssrf</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-13T11:07:18.500Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/web-app-technologies/browser</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-13T11:12:52.403Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/web-app-technologies/browser/firefox-credentials-dumping</loc>
				<priority>0.59</priority>
				<lastmod>2026-02-13T11:12:52.403Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/web-app-technologies/cms-content-management-system-pentesting</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-13T11:14:46.084Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/web-app-technologies/cms-content-management-system-pentesting/bolt-cms-pentesting</loc>
				<priority>0.59</priority>
				<lastmod>2026-02-13T11:14:46.084Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/web-app-technologies/cms-content-management-system-pentesting/cockpit-cms-pentesting</loc>
				<priority>0.59</priority>
				<lastmod>2026-02-13T11:16:02.840Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/web-app-technologies/cms-content-management-system-pentesting/concrete-cms-pentesting</loc>
				<priority>0.59</priority>
				<lastmod>2026-02-13T11:16:02.841Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/web-app-technologies/cms-content-management-system-pentesting/fuel-cms-pentesting</loc>
				<priority>0.59</priority>
				<lastmod>2026-02-13T11:16:02.841Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/web-app-technologies/cms-content-management-system-pentesting/joomla-cms-pentesting</loc>
				<priority>0.59</priority>
				<lastmod>2026-02-13T11:17:48.430Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/web-app-technologies/cms-content-management-system-pentesting/joomla-cms-pentesting/joomla</loc>
				<priority>0.5</priority>
				<lastmod>2026-01-24T08:56:54.642Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/web-app-technologies/cms-content-management-system-pentesting/mara-cms-pentesting</loc>
				<priority>0.59</priority>
				<lastmod>2026-02-13T11:17:48.430Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/web-app-technologies/cms-content-management-system-pentesting/subrion-cms-pentesting</loc>
				<priority>0.59</priority>
				<lastmod>2026-02-13T11:19:04.094Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/web-app-technologies/cms-content-management-system-pentesting/typo3-pentesting</loc>
				<priority>0.59</priority>
				<lastmod>2026-02-13T11:19:04.094Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/web-app-technologies/cms-content-management-system-pentesting/wordpress-pentesting</loc>
				<priority>0.59</priority>
				<lastmod>2026-02-13T11:20:22.285Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/web-app-technologies/cms-content-management-system-pentesting/wordpress-pentesting/wordpress</loc>
				<priority>0.5</priority>
				<lastmod>2026-01-24T08:54:13.185Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/web-app-technologies/elasticsearch-pentesting</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-13T11:22:31.751Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/web-app-technologies/kibana-pentesting</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-13T11:22:31.751Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/web-app-technologies/frameworks</loc>
				<priority>0.7</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/web-app-technologies/frameworks/angular-pentesting</loc>
				<priority>0.59</priority>
				<lastmod>2026-02-13T11:25:23.191Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/web-app-technologies/frameworks/ajp-apache-jserv-protocol-pentesting</loc>
				<priority>0.59</priority>
				<lastmod>2026-02-13T11:25:22.982Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/web-app-technologies/frameworks/apache-struts-pentesting</loc>
				<priority>0.59</priority>
				<lastmod>2026-02-13T11:26:30.207Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/web-app-technologies/frameworks/blazor-pentesting</loc>
				<priority>0.59</priority>
				<lastmod>2026-02-13T11:26:30.232Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/web-app-technologies/frameworks/django-pentesting</loc>
				<priority>0.59</priority>
				<lastmod>2026-02-13T11:27:32.622Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/web-app-technologies/frameworks/flask-jinja2-pentesting</loc>
				<priority>0.59</priority>
				<lastmod>2026-02-13T11:27:32.622Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/web-app-technologies/frameworks/python-pickle-rce</loc>
				<priority>0.59</priority>
				<lastmod>2026-02-13T11:29:02.346Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/web-app-technologies/frameworks/ruby-on-rails-pentesting</loc>
				<priority>0.59</priority>
				<lastmod>2026-02-13T11:29:02.346Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/web-app-technologies/frameworks/spring-cloud-function-rce</loc>
				<priority>0.59</priority>
				<lastmod>2026-02-13T11:30:17.033Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/web-app-technologies/frameworks/spring-pentesting</loc>
				<priority>0.59</priority>
				<lastmod>2026-02-13T11:30:17.033Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/web-app-technologies/frameworks/tornado-pentesting</loc>
				<priority>0.59</priority>
				<lastmod>2026-02-13T11:31:34.689Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/web-app-technologies/frameworks/werkzeug-pentesting</loc>
				<priority>0.59</priority>
				<lastmod>2026-02-13T11:31:34.689Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/web-app-technologies/jsrender-template-injection</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-13T11:33:12.621Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/web-app-technologies/js</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-24T08:35:14.998Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/web-app-technologies/pug-pentesting</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-13T11:33:12.621Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/web-app-technologies/asp.net</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-24T08:37:10.879Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/web-app-technologies/jwt</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-13T09:54:57.900Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/web-app-technologies/github</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-24T08:45:17.688Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/web-app-technologies/gitlab</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-24T08:47:03.140Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/web-app-technologies/waf-web-application-firewall-detection</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-13T10:51:00.362Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/web-app-technologies/firebird</loc>
				<priority>0.7</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/web-app-technologies/jenkins</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-13T09:46:03.669Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/web-app-technologies/iis</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-24T09:05:10.302Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/web-app-technologies/virtual-hosts-vhosts</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-13T10:49:19.518Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/web-app-technologies/firebase</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-24T09:06:54.205Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/web-app-technologies/owa</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-24T09:08:17.194Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/web-app-technologies/oauth</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-13T10:11:01.726Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/web-app-technologies/flask</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-24T09:12:36.995Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/web-app-technologies/symfony-and-and-twig</loc>
				<priority>0.7</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/web-app-technologies/drupal</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-24T09:14:08.022Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/web-app-technologies/nosql-mongodb-couchdb</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-04T15:54:15.034Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/web-app-technologies/php</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-13T10:19:47.774Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/web-app-technologies/php/php-hash_hmac-bypass</loc>
				<priority>0.59</priority>
				<lastmod>2026-02-13T10:20:49.691Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/web-app-technologies/php/php-object-injection</loc>
				<priority>0.59</priority>
				<lastmod>2026-02-13T10:21:52.114Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/web-app-technologies/php/php-rce-cheat-sheet</loc>
				<priority>0.59</priority>
				<lastmod>2026-02-13T10:21:52.114Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/web-app-technologies/php/php-srand-time-abusing</loc>
				<priority>0.59</priority>
				<lastmod>2026-02-13T10:23:45.045Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/web-app-technologies/ror-ruby-on-rails</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-24T09:19:01.158Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/web-app-technologies/onelogin-saml-login</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-24T09:22:52.329Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/web-app-technologies/flash-swf</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-24T09:24:22.580Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/web-app-technologies/nginx</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-24T09:25:31.185Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/web-app-technologies/python</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-24T09:25:31.185Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/web-app-technologies/tomcat</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-24T09:27:02.865Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/web-app-technologies/adobe-aem</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-24T09:30:40.566Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/web-app-technologies/magento</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-24T09:30:40.566Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/web-app-technologies/sap</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-24T09:32:18.101Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/web-app-technologies/mfa-2fa</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-24T09:33:56.298Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/web-app-technologies/gwt</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-24T09:35:01.708Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/web-app-technologies/jira</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-24T09:35:01.708Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/web-app-technologies/oidc-open-id-connect</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-13T10:12:52.658Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/web-app-technologies/elk</loc>
				<priority>0.7</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/web-app-technologies/sharepoint</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-24T09:41:13.883Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/web-app-technologies/others</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-24T09:49:23.300Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/unix-enum</loc>
				<priority>0.84</priority>
				<lastmod>2026-02-11T13:49:10.224Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/windows-enum</loc>
				<priority>0.84</priority>
				<lastmod>2026-02-11T13:47:17.978Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/windows-enum/smb-server-message-block-pentesting</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-14T04:52:15.181Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/windows-enum/wsl-pentesting</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-14T04:25:32.238Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/windows-enum/laps-local-administrator-password-solution-pentesting</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-14T04:46:39.542Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/windows-enum/ldap-lightweight-directory-access-protocol-pentesting</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-14T04:48:41.786Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/windows-enum/ad-enum</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-11T13:52:06.166Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/enumeration/windows-enum/kerberos-pentesting</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-14T04:45:12.894Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/pre-exploitation</loc>
				<priority>0.84</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/pre-exploitation/shells</loc>
				<priority>0.7</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/pre-exploitation/shells/blind-shells</loc>
				<priority>0.59</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/pre-exploitation/shells/reverse-shells</loc>
				<priority>0.59</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/pre-exploitation/shells/web-shell</loc>
				<priority>0.59</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/pre-exploitation/shells/cmd-vs-powershell</loc>
				<priority>0.59</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/pre-exploitation/shells/escape-shell-jail</loc>
				<priority>0.59</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/pre-exploitation/password-wordlist-generation</loc>
				<priority>0.7</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/pre-exploitation/tools</loc>
				<priority>0.7</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/pre-exploitation/tools/msfconsole</loc>
				<priority>0.59</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/pre-exploitation/tools/msfconsole/searching-module</loc>
				<priority>0.5</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/pre-exploitation/tools/msfconsole/using-module</loc>
				<priority>0.5</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/pre-exploitation/tools/msfconsole/payloads-and-encoders</loc>
				<priority>0.5</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/pre-exploitation/tools/msfconsole/sessions-and-jobs</loc>
				<priority>0.5</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/pre-exploitation/tools/msfconsole/meterpreter</loc>
				<priority>0.5</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/pre-exploitation/tools/msfconsole/databases</loc>
				<priority>0.5</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/pre-exploitation/tools/msfvenom</loc>
				<priority>0.59</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/pre-exploitation/tools/msfvenom/common-payloads</loc>
				<priority>0.5</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/pre-exploitation/tools/msfvenom/evasion</loc>
				<priority>0.5</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/pre-exploitation/tools/searchsploit</loc>
				<priority>0.59</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/exploitation</loc>
				<priority>0.84</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/exploitation/service-exploitation</loc>
				<priority>0.7</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/exploitation/service-exploitation/service</loc>
				<priority>0.59</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/exploitation/service-exploitation/service/ftp-21</loc>
				<priority>0.5</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/exploitation/service-exploitation/service/ssh-22</loc>
				<priority>0.5</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/exploitation/service-exploitation/service/smtp-25-465-587-and-pop3-110-995</loc>
				<priority>0.5</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/exploitation/service-exploitation/service/smtp-25-465-587-and-pop3-110-995/open-relay-attack</loc>
				<priority>0.42</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/exploitation/service-exploitation/service/dns-53</loc>
				<priority>0.5</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/exploitation/service-exploitation/service/smb-139-445</loc>
				<priority>0.5</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/exploitation/service-exploitation/service/ldap-389</loc>
				<priority>0.5</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/exploitation/service-exploitation/service/mssql-1433-2433</loc>
				<priority>0.5</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/exploitation/service-exploitation/service/mssql-1433-2433/manual</loc>
				<priority>0.42</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/exploitation/service-exploitation/service/mssql-1433-2433/linked-servers</loc>
				<priority>0.42</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/exploitation/service-exploitation/service/mysql-3306</loc>
				<priority>0.5</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/exploitation/service-exploitation/service/mysql-3306/sql-union-injections</loc>
				<priority>0.42</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/exploitation/service-exploitation/service/mysql-3306/reading-files</loc>
				<priority>0.42</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/exploitation/service-exploitation/service/mysql-3306/writing-files</loc>
				<priority>0.42</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/exploitation/service-exploitation/service/oracle-tns-1521</loc>
				<priority>0.5</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/exploitation/service-exploitation/service/nfs-2049</loc>
				<priority>0.5</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/exploitation/service-exploitation/service/rdp-3389</loc>
				<priority>0.5</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/exploitation/service-exploitation/service/winrm-5985-5986</loc>
				<priority>0.5</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/exploitation/service-exploitation/tool</loc>
				<priority>0.59</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/exploitation/service-exploitation/tool/sqlmap</loc>
				<priority>0.5</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/exploitation/service-exploitation/tool/advanced-enumeration</loc>
				<priority>0.5</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/exploitation/service-exploitation/tool/waf-evasion</loc>
				<priority>0.5</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/exploitation/service-exploitation/tool/os-exploitation</loc>
				<priority>0.5</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/exploitation/service-exploitation/tool/responder</loc>
				<priority>0.5</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/exploitation/web-exploitation</loc>
				<priority>0.7</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/exploitation/web-exploitation/http-basic-auth-brute-forcing</loc>
				<priority>0.59</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/exploitation/web-exploitation/login-form-brute-forcing</loc>
				<priority>0.59</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/exploitation/web-exploitation/cross-site-scripting-xss</loc>
				<priority>0.59</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/exploitation/web-exploitation/cross-site-scripting-xss/discovery</loc>
				<priority>0.5</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/exploitation/web-exploitation/cross-site-scripting-xss/phishing</loc>
				<priority>0.5</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/exploitation/web-exploitation/cross-site-scripting-xss/session-hijacking</loc>
				<priority>0.5</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/exploitation/web-exploitation/local-file-inclusion</loc>
				<priority>0.59</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/exploitation/web-exploitation/local-file-inclusion/file-disclosure</loc>
				<priority>0.5</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/exploitation/web-exploitation/local-file-inclusion/filter-bypass</loc>
				<priority>0.5</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/exploitation/web-exploitation/local-file-inclusion/lfi-to-remote-code-execution</loc>
				<priority>0.5</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/exploitation/web-exploitation/local-file-inclusion/vulnerable-code-examples</loc>
				<priority>0.5</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/exploitation/web-exploitation/file-upload-attacks</loc>
				<priority>0.59</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/exploitation/web-exploitation/command-injection</loc>
				<priority>0.59</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/exploitation/web-exploitation/command-injection/filter-identification</loc>
				<priority>0.5</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/exploitation/web-exploitation/command-injection/filter-bypass</loc>
				<priority>0.5</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/exploitation/web-exploitation/http-verb-tampering</loc>
				<priority>0.59</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/exploitation/web-exploitation/idor</loc>
				<priority>0.59</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/exploitation/web-exploitation/xxe</loc>
				<priority>0.59</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/exploitation/web-exploitation/xxe/file-disclosure</loc>
				<priority>0.5</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/exploitation/web-exploitation/xxe/blind</loc>
				<priority>0.5</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/exploitation/web-exploitation/xxe/rce</loc>
				<priority>0.5</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/exploitation/web-exploitation/cgi-shellshock-attack</loc>
				<priority>0.59</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/exploitation/web-exploitation/mass-assignment</loc>
				<priority>0.59</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/exploitation/web-exploitation/tool</loc>
				<priority>0.59</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/exploitation/web-exploitation/tool/cewl</loc>
				<priority>0.5</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/exploitation/web-exploitation/tool/cupp</loc>
				<priority>0.5</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/exploitation/application-exploitation</loc>
				<priority>0.7</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/exploitation/application-exploitation/wordpress</loc>
				<priority>0.59</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/exploitation/application-exploitation/joomla</loc>
				<priority>0.59</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/exploitation/application-exploitation/drupal</loc>
				<priority>0.59</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/exploitation/application-exploitation/drupal/drupalgeddon</loc>
				<priority>0.5</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/exploitation/application-exploitation/tomcat</loc>
				<priority>0.59</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/exploitation/application-exploitation/tomcat/cve-2019-0232</loc>
				<priority>0.5</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/exploitation/application-exploitation/jenkins</loc>
				<priority>0.59</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/exploitation/application-exploitation/splunk</loc>
				<priority>0.59</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/exploitation/application-exploitation/prtg-network-monitor</loc>
				<priority>0.59</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/exploitation/application-exploitation/osticket</loc>
				<priority>0.59</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/exploitation/application-exploitation/gitlab</loc>
				<priority>0.59</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/exploitation/application-exploitation/coldfusion</loc>
				<priority>0.59</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/exploitation/application-exploitation/nagios-xi</loc>
				<priority>0.59</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/exploitation/application-exploitation/dotnetnuke</loc>
				<priority>0.59</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/exploitation/application-exploitation/other-application</loc>
				<priority>0.59</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/exploitation/binary-exploitation</loc>
				<priority>0.7</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/exploitation/binary-exploitation/elf-executable-examination</loc>
				<priority>0.59</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/exploitation/binary-exploitation/dll-file-examination</loc>
				<priority>0.59</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/exploitation/active-directory-attacks</loc>
				<priority>0.7</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/exploitation/active-directory-attacks/network-poisoning</loc>
				<priority>0.59</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/exploitation/active-directory-attacks/password-spraying</loc>
				<priority>0.59</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/exploitation/active-directory-attacks/kerberoasting</loc>
				<priority>0.59</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/exploitation/active-directory-attacks/kerberoasting/attacking-from-a-linux-host</loc>
				<priority>0.5</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/exploitation/active-directory-attacks/kerberoasting/attacking-from-a-windows-host</loc>
				<priority>0.5</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/exploitation/active-directory-attacks/asreproasting</loc>
				<priority>0.59</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/exploitation/active-directory-attacks/group-policy-preferences-passwords</loc>
				<priority>0.59</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/exploitation/active-directory-attacks/acl-abuse</loc>
				<priority>0.59</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/exploitation/active-directory-attacks/acl-abuse/set-domainuserpassword</loc>
				<priority>0.5</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/exploitation/active-directory-attacks/acl-abuse/add-domaingroupmember</loc>
				<priority>0.5</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/exploitation/active-directory-attacks/acl-abuse/set-domainobject</loc>
				<priority>0.5</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/exploitation/active-directory-attacks/smb-hash-stealing</loc>
				<priority>0.59</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/exploitation/active-directory-attacks/dcsync</loc>
				<priority>0.59</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/exploitation/active-directory-attacks/nopac</loc>
				<priority>0.59</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/exploitation/active-directory-attacks/printnightmare</loc>
				<priority>0.59</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/exploitation/active-directory-attacks/petitpotam</loc>
				<priority>0.59</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/exploitation/active-directory-attacks/misconfigurations</loc>
				<priority>0.59</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/exploitation/active-directory-attacks/misconfigurations/sysvol-pillaging</loc>
				<priority>0.5</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/exploitation/active-directory-attacks/misconfigurations/password-in-description-field</loc>
				<priority>0.5</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/exploitation/active-directory-attacks/misconfigurations/passwd_notreqd-field</loc>
				<priority>0.5</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/exploitation/active-directory-attacks/misconfigurations/group-policy-object-abuse</loc>
				<priority>0.5</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/exploitation/active-directory-attacks/trust-relationship-abuse</loc>
				<priority>0.59</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/exploitation/active-directory-attacks/trust-relationship-abuse/attacking-child-greater-than-parent-trust</loc>
				<priority>0.5</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/exploitation/active-directory-attacks/trust-relationship-abuse/attacking-cross-forest-trust</loc>
				<priority>0.5</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/web-app-attacks</loc>
				<priority>0.84</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/web-app-attacks/general-info</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-24T07:13:42.743Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/web-app-attacks/quick-tricks</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-24T07:13:42.743Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/web-app-attacks/header-injections</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-13T09:38:08.173Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/web-app-attacks/bruteforcing</loc>
				<priority>0.7</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/web-app-attacks/online-hashes-cracked</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-24T07:25:21.666Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/web-app-attacks/broken-access-control</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-13T08:26:22.601Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/web-app-attacks/broken-links-hijacking</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-13T08:28:49.906Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/web-app-attacks/business-logic-attack</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-13T08:30:39.801Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/web-app-attacks/captcha-bypass-with-ocr</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-13T08:37:26.630Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/web-app-attacks/client-server-side-filter-bypass</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-13T08:40:02.321Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/web-app-attacks/client-side-javascript-validation-bypass</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-13T08:40:02.321Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/web-app-attacks/directory-path-traversal</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-13T09:01:44.587Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/web-app-attacks/code-deobfuscation</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-13T08:43:27.977Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/web-app-attacks/cookie-hijacking</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-13T08:47:35.750Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/web-app-attacks/dom-cloberring</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-13T09:02:55.864Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/web-app-attacks/crawl-fuzz</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-24T07:28:34.606Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/web-app-attacks/file-inclusion-lfi-rfi</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-13T09:13:52.433Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/web-app-attacks/grafana-pentesting</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-13T09:28:36.933Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/web-app-attacks/hashicorp-consul-pentesting</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-13T09:33:33.505Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/web-app-attacks/file-upload</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-13T09:23:13.441Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/web-app-attacks/file-upload/file-upload-attack-on-exiftool</loc>
				<priority>0.59</priority>
				<lastmod>2026-02-13T09:15:48.788Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/web-app-attacks/file-upload/file-upload-attack-on-imagemagick</loc>
				<priority>0.59</priority>
				<lastmod>2026-02-13T09:15:48.788Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/web-app-attacks/sql-injection-cheat-sheet</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-13T10:39:24.714Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/web-app-attacks/sqli</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-04T15:43:26.857Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/web-app-attacks/sql-injection-with-sqlmap</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-13T10:43:37.945Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/web-app-attacks/nosql-injection</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-13T10:07:49.576Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/web-app-attacks/srf-server-side-request-forgery</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-13T10:45:19.936Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/web-app-attacks/redis-ssrf</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-13T10:28:13.967Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/web-app-attacks/open-redirect</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-13T10:14:13.775Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/web-app-attacks/xss-cross-site-scripting</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-13T11:09:07.391Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/web-app-attacks/xss-with-dynamic-pdf</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-13T11:07:18.500Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/web-app-attacks/xst-cross-site-tracing</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-13T11:09:07.391Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/web-app-attacks/csp</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-24T07:39:35.389Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/web-app-attacks/xxe</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-13T11:11:44.904Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/web-app-attacks/cookie-padding</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-24T07:44:59.436Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/web-app-attacks/webshells</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-24T07:44:59.436Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/web-app-attacks/cors-cross-origin-resource-sharing-attack</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-13T08:57:18.759Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/web-app-attacks/csrf-cross-site-request-forgery</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-13T08:52:13.882Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/web-app-attacks/web-cache-poisoning</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-13T10:52:33.504Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/web-app-attacks/clickjacking</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-05T13:16:34.885Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/web-app-attacks/http-request-smuggling</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-13T10:30:27.218Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/web-app-attacks/websocket-pentesting</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-13T11:06:15.485Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/web-app-attacks/web-content-discovery</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-13T10:54:54.592Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/web-app-attacks/web-login-bypass</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-13T10:57:35.037Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/web-app-attacks/web-race-condition</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-13T11:00:00.556Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/web-app-attacks/web-registration-signup</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-13T11:00:00.556Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/web-app-attacks/web-server-security-misconfiguration</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-13T11:01:21.493Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/web-app-attacks/webanno-pentesting</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-13T11:01:21.493Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/web-app-attacks/crlf</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-24T08:08:02.743Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/web-app-attacks/idor-insecure-direct-object-references-attack</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-13T09:43:26.973Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/web-app-attacks/web-cache-deception</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-13T10:52:33.504Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/web-app-attacks/session-fixation</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-13T10:32:20.579Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/web-app-attacks/email-attacks</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-13T06:19:05.696Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/web-app-attacks/pastejacking</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-24T08:16:54.892Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/web-app-attacks/http-parameter-pollution</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-24T08:18:05.646Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/web-app-attacks/ssti-server-side-template-injection</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-13T10:46:27.578Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/web-app-attacks/go-ssti</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-13T09:25:51.667Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/web-app-attacks/prototype-pollution</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-13T10:25:00.114Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/web-app-attacks/prototype-pollution/prototype-pollution-in-server-side</loc>
				<priority>0.59</priority>
				<lastmod>2026-02-13T10:27:08.348Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/web-app-attacks/os-command-injection</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-13T10:17:48.010Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/web-app-attacks/insecure-deserialization</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-13T09:44:50.508Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/web-app-attacks/dns-domain-name-systems-pentesting</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-13T06:16:19.508Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/web-app-attacks/dns-domain-name-systems-pentesting/mdns-multicast-dns-pentesting</loc>
				<priority>0.59</priority>
				<lastmod>2026-02-13T06:16:19.508Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/web-app-attacks/vulnerable-components</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-05T13:35:47.119Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/web-app-attacks/http-rate-limiting</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-13T09:39:15.604Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/web-app-attacks/bookmarklet-attack</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-13T08:21:12.545Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/payloads</loc>
				<priority>0.84</priority>
				<lastmod>2026-01-25T09:52:49.378Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/reverse-shells</loc>
				<priority>0.84</priority>
				<lastmod>2026-02-12T07:52:07.987Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/reverse-shells/shell</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-12T07:50:00.448Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/file-transfer</loc>
				<priority>0.84</priority>
				<lastmod>2026-02-05T05:24:35.779Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/unix-exploit</loc>
				<priority>0.84</priority>
				<lastmod>2026-02-10T01:30:28.978Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/unix-exploit/fork-bomb</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-13T06:38:45.690Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/window-exploit</loc>
				<priority>0.84</priority>
				<lastmod>2026-02-10T02:20:54.441Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/window-exploit/malicious-pdf</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-14T04:24:15.146Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/window-exploit/windows-print-spooler-service</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-14T04:25:32.238Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/window-exploit/msrpc-microsoft-remote-procedure-call-pentesting</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-14T04:32:00.867Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/window-exploit/rdp-remote-desktop-protocol-pentesting</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-14T04:32:00.867Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/window-exploit/winrm-windows-remote-management-pentesting</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-14T04:33:48.754Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/window-exploit/ldap-injection</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-14T04:46:39.542Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/window-exploit/netlogon-elevasion</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-14T04:48:41.786Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/window-exploit/ad-exploit</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-11T13:52:06.166Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/window-exploit/as-rep-roasting</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-14T04:41:19.400Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/window-exploit/constrained-delegation-attack</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-14T04:41:19.400Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/window-exploit/dacl-discretionary-access-control-list-attack</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-14T04:43:11.807Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/window-exploit/kerberoasting-attack</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-14T04:43:11.807Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/window-exploit/rbcd-resource-based-constrained-delegation-attack</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-14T04:50:31.122Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/exploitation/window-exploit/shadow-credentials</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-14T04:51:54.135Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/privilege-escalation/post-exploitation</loc>
				<priority>0.84</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/privilege-escalation/post-exploitation/fully-interactive-tty</loc>
				<priority>0.7</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/privilege-escalation/post-exploitation/linux-post-exploitation</loc>
				<priority>0.7</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/privilege-escalation/post-exploitation/linux-post-exploitation/info-mount-bitlocker-volume</loc>
				<priority>0.59</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/privilege-escalation/post-exploitation/linux-post-exploitation/pillage-and-recon</loc>
				<priority>0.59</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/privilege-escalation/post-exploitation/linux-post-exploitation/pillage-and-recon/host-recon</loc>
				<priority>0.5</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/privilege-escalation/post-exploitation/linux-post-exploitation/privilege-escalation</loc>
				<priority>0.59</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/privilege-escalation/post-exploitation/linux-post-exploitation/privilege-escalation/privileged-groups</loc>
				<priority>0.5</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/privilege-escalation/post-exploitation/linux-post-exploitation/sudo-abuse</loc>
				<priority>0.59</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/privilege-escalation/post-exploitation/linux-post-exploitation/sudo-abuse/ld_preload</loc>
				<priority>0.5</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/privilege-escalation/post-exploitation/linux-post-exploitation/sudo-abuse/ld_library_path</loc>
				<priority>0.5</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/privilege-escalation/post-exploitation/linux-post-exploitation/suid-guid</loc>
				<priority>0.59</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/privilege-escalation/post-exploitation/linux-post-exploitation/cronjob-abuse</loc>
				<priority>0.59</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/privilege-escalation/post-exploitation/linux-post-exploitation/capabilities</loc>
				<priority>0.59</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/privilege-escalation/post-exploitation/linux-post-exploitation/wildcard-injection</loc>
				<priority>0.59</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/privilege-escalation/post-exploitation/linux-post-exploitation/wildcard-injection/tar</loc>
				<priority>0.5</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/privilege-escalation/post-exploitation/linux-post-exploitation/wildcard-injection/rsync</loc>
				<priority>0.5</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/privilege-escalation/post-exploitation/linux-post-exploitation/python-library-hijacking</loc>
				<priority>0.59</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/privilege-escalation/post-exploitation/linux-post-exploitation/credential-hunting</loc>
				<priority>0.59</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/privilege-escalation/post-exploitation/linux-post-exploitation/credential-hunting/files</loc>
				<priority>0.5</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/privilege-escalation/post-exploitation/linux-post-exploitation/credential-hunting/history</loc>
				<priority>0.5</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/privilege-escalation/post-exploitation/linux-post-exploitation/credential-hunting/memory</loc>
				<priority>0.5</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/privilege-escalation/post-exploitation/linux-post-exploitation/credential-hunting/key-rings</loc>
				<priority>0.5</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/privilege-escalation/post-exploitation/linux-post-exploitation/nfs-no_root_squash</loc>
				<priority>0.59</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/privilege-escalation/post-exploitation/linux-post-exploitation/path-abuse</loc>
				<priority>0.59</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/privilege-escalation/post-exploitation/linux-post-exploitation/docker-group</loc>
				<priority>0.59</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/privilege-escalation/post-exploitation/linux-post-exploitation/passwd-shadow-and-opasswd</loc>
				<priority>0.59</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/privilege-escalation/post-exploitation/linux-post-exploitation/passwd-shadow-and-opasswd/writeable-etc-passwd</loc>
				<priority>0.5</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/privilege-escalation/post-exploitation/linux-post-exploitation/passwd-shadow-and-opasswd/readable-etc-shadow</loc>
				<priority>0.5</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/privilege-escalation/post-exploitation/linux-post-exploitation/passwd-shadow-and-opasswd/writeable-etc-shadow</loc>
				<priority>0.5</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/privilege-escalation/post-exploitation/linux-post-exploitation/escaping-restricted-shells</loc>
				<priority>0.59</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/privilege-escalation/post-exploitation/linux-post-exploitation/tmux-session-hijacking</loc>
				<priority>0.59</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/privilege-escalation/post-exploitation/linux-post-exploitation/shared-object-hijacking</loc>
				<priority>0.59</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/privilege-escalation/post-exploitation/linux-post-exploitation/pwnkit</loc>
				<priority>0.59</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/privilege-escalation/post-exploitation/linux-post-exploitation/logrotten</loc>
				<priority>0.59</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/privilege-escalation/post-exploitation/linux-post-exploitation/kubernetes</loc>
				<priority>0.59</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/privilege-escalation/post-exploitation/linux-post-exploitation/payloads</loc>
				<priority>0.59</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/privilege-escalation/post-exploitation/linux-post-exploitation/file-transfer</loc>
				<priority>0.59</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/privilege-escalation/post-exploitation/linux-post-exploitation/file-transfer/base64-encode-and-decode</loc>
				<priority>0.5</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/privilege-escalation/post-exploitation/linux-post-exploitation/file-transfer/wget-curl-download-and-upload</loc>
				<priority>0.5</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/privilege-escalation/post-exploitation/linux-post-exploitation/file-transfer/bash-download</loc>
				<priority>0.5</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/privilege-escalation/post-exploitation/linux-post-exploitation/file-transfer/ssh-download</loc>
				<priority>0.5</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/privilege-escalation/post-exploitation/linux-post-exploitation/file-transfer/upload-server</loc>
				<priority>0.5</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/privilege-escalation/post-exploitation/linux-post-exploitation/file-transfer/code-download-and-upload</loc>
				<priority>0.5</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/privilege-escalation/post-exploitation/linux-post-exploitation/file-transfer/smb-download-and-upload</loc>
				<priority>0.5</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/privilege-escalation/post-exploitation/linux-post-exploitation/file-transfer/ftp-downlaod</loc>
				<priority>0.5</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/privilege-escalation/post-exploitation/linux-post-exploitation/file-transfer/file-encryption</loc>
				<priority>0.5</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/privilege-escalation/post-exploitation/windows-post-exploitation</loc>
				<priority>0.7</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/privilege-escalation/post-exploitation/windows-post-exploitation/info</loc>
				<priority>0.59</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/privilege-escalation/post-exploitation/windows-post-exploitation/info/accounts</loc>
				<priority>0.5</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/privilege-escalation/post-exploitation/windows-post-exploitation/info/access-control-list-acl</loc>
				<priority>0.5</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/privilege-escalation/post-exploitation/windows-post-exploitation/info/access-control-list-acl-1</loc>
				<priority>0.5</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/privilege-escalation/post-exploitation/windows-post-exploitation/info/built-in-ad-groups</loc>
				<priority>0.5</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/privilege-escalation/post-exploitation/windows-post-exploitation/info/ntfs</loc>
				<priority>0.5</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/privilege-escalation/post-exploitation/windows-post-exploitation/info/ntfs/ntfsvs.-smb</loc>
				<priority>0.42</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/privilege-escalation/post-exploitation/windows-post-exploitation/info/services</loc>
				<priority>0.5</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/privilege-escalation/post-exploitation/windows-post-exploitation/info/execution-policy</loc>
				<priority>0.5</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/privilege-escalation/post-exploitation/windows-post-exploitation/info/registry</loc>
				<priority>0.5</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/privilege-escalation/post-exploitation/windows-post-exploitation/info/powershell</loc>
				<priority>0.5</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/privilege-escalation/post-exploitation/windows-post-exploitation/pillage-and-recon</loc>
				<priority>0.59</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/privilege-escalation/post-exploitation/windows-post-exploitation/pillage-and-recon/host-recon</loc>
				<priority>0.5</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/privilege-escalation/post-exploitation/windows-post-exploitation/pillage-and-recon/host-recon/net-commands</loc>
				<priority>0.42</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/privilege-escalation/post-exploitation/windows-post-exploitation/pillage-and-recon/host-recon/wmic-commands</loc>
				<priority>0.42</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/privilege-escalation/post-exploitation/windows-post-exploitation/pillage-and-recon/host-recon/dsquery</loc>
				<priority>0.42</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/privilege-escalation/post-exploitation/windows-post-exploitation/pillage-and-recon/rights-and-privileges</loc>
				<priority>0.5</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/privilege-escalation/post-exploitation/windows-post-exploitation/pillage-and-recon/users-and-groups</loc>
				<priority>0.5</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/privilege-escalation/post-exploitation/windows-post-exploitation/privilege-escalation</loc>
				<priority>0.59</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/privilege-escalation/post-exploitation/windows-post-exploitation/privilege-escalation/legacy-operating-systems</loc>
				<priority>0.5</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/privilege-escalation/post-exploitation/windows-post-exploitation/privilege-escalation/legacy-operating-systems/windows-server-2008-2008-r2</loc>
				<priority>0.42</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/privilege-escalation/post-exploitation/windows-post-exploitation/privilege-escalation/legacy-operating-systems/windows-7</loc>
				<priority>0.42</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/privilege-escalation/post-exploitation/windows-post-exploitation/user-privileges</loc>
				<priority>0.59</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/privilege-escalation/post-exploitation/windows-post-exploitation/user-privileges/seimpersonate-and-seassignprimarytoken</loc>
				<priority>0.5</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/privilege-escalation/post-exploitation/windows-post-exploitation/user-privileges/sedebugprivilege</loc>
				<priority>0.5</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/privilege-escalation/post-exploitation/windows-post-exploitation/user-privileges/setakeownershipprivilege</loc>
				<priority>0.5</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/privilege-escalation/post-exploitation/windows-post-exploitation/privileged-groups</loc>
				<priority>0.59</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/privilege-escalation/post-exploitation/windows-post-exploitation/privileged-groups/backup-operators</loc>
				<priority>0.5</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/privilege-escalation/post-exploitation/windows-post-exploitation/privileged-groups/event-log-readers</loc>
				<priority>0.5</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/privilege-escalation/post-exploitation/windows-post-exploitation/privileged-groups/dnsadmins</loc>
				<priority>0.5</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/privilege-escalation/post-exploitation/windows-post-exploitation/privileged-groups/hyper-v-administrators</loc>
				<priority>0.5</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/privilege-escalation/post-exploitation/windows-post-exploitation/privileged-groups/print-operators</loc>
				<priority>0.5</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/privilege-escalation/post-exploitation/windows-post-exploitation/privileged-groups/server-operators</loc>
				<priority>0.5</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/privilege-escalation/post-exploitation/windows-post-exploitation/user-computer-description-field</loc>
				<priority>0.59</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/privilege-escalation/post-exploitation/windows-post-exploitation/scheduled-tasks</loc>
				<priority>0.59</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/privilege-escalation/post-exploitation/windows-post-exploitation/credential-hunting</loc>
				<priority>0.59</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/privilege-escalation/post-exploitation/windows-post-exploitation/credential-sniffing</loc>
				<priority>0.59</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/privilege-escalation/post-exploitation/windows-post-exploitation/always-install-elevated</loc>
				<priority>0.59</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/privilege-escalation/post-exploitation/windows-post-exploitation/unquoted-service-path</loc>
				<priority>0.59</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/privilege-escalation/post-exploitation/windows-post-exploitation/vulnerable-services</loc>
				<priority>0.59</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/privilege-escalation/post-exploitation/windows-post-exploitation/cookie-stealing</loc>
				<priority>0.59</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/privilege-escalation/post-exploitation/windows-post-exploitation/weak-service-permissions</loc>
				<priority>0.59</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/privilege-escalation/post-exploitation/windows-post-exploitation/permissive-registry-acls</loc>
				<priority>0.59</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/privilege-escalation/post-exploitation/windows-post-exploitation/modifiable-registry-autorun-binary</loc>
				<priority>0.59</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/privilege-escalation/post-exploitation/windows-post-exploitation/kernel-exploits</loc>
				<priority>0.59</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/privilege-escalation/post-exploitation/windows-post-exploitation/kernel-exploits/kernel-exploit-table</loc>
				<priority>0.5</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/privilege-escalation/post-exploitation/windows-post-exploitation/vmdk-vhd-and-vhdx-files</loc>
				<priority>0.59</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/privilege-escalation/post-exploitation/windows-post-exploitation/malicious-scf-and-.ink-file</loc>
				<priority>0.59</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/privilege-escalation/post-exploitation/windows-post-exploitation/sam-and-lsa-attack</loc>
				<priority>0.59</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/privilege-escalation/post-exploitation/windows-post-exploitation/lsass-attack</loc>
				<priority>0.59</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/privilege-escalation/post-exploitation/windows-post-exploitation/ntds.dit-attack</loc>
				<priority>0.59</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/privilege-escalation/post-exploitation/windows-post-exploitation/restic-backup-attack</loc>
				<priority>0.59</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/privilege-escalation/post-exploitation/windows-post-exploitation/citrix-breakout</loc>
				<priority>0.59</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/privilege-escalation/post-exploitation/windows-post-exploitation/bypassing-uac</loc>
				<priority>0.59</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/privilege-escalation/post-exploitation/windows-post-exploitation/payloads</loc>
				<priority>0.59</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/privilege-escalation/post-exploitation/windows-post-exploitation/file-transfer</loc>
				<priority>0.59</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/privilege-escalation/post-exploitation/windows-post-exploitation/file-transfer/netexec-download-and-upload</loc>
				<priority>0.5</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/privilege-escalation/post-exploitation/windows-post-exploitation/file-transfer/base64-encode-and-decode</loc>
				<priority>0.5</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/privilege-escalation/post-exploitation/windows-post-exploitation/file-transfer/powershell-download-and-upload</loc>
				<priority>0.5</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/privilege-escalation/post-exploitation/windows-post-exploitation/file-transfer/code-download-and-upload</loc>
				<priority>0.5</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/privilege-escalation/post-exploitation/windows-post-exploitation/file-transfer/powershell-remoting</loc>
				<priority>0.5</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/privilege-escalation/post-exploitation/windows-post-exploitation/file-transfer/rdp</loc>
				<priority>0.5</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/privilege-escalation/post-exploitation/windows-post-exploitation/file-transfer/file-encryption</loc>
				<priority>0.5</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/privilege-escalation/post-exploitation/windows-post-exploitation/tools</loc>
				<priority>0.59</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/privilege-escalation/post-exploitation/windows-post-exploitation/tools/hashcat</loc>
				<priority>0.5</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/privilege-escalation/post-exploitation/windows-post-exploitation/tools/hashcat/common-modes</loc>
				<priority>0.42</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/privilege-escalation/post-exploitation/windows-post-exploitation/tools/john-the-ripper</loc>
				<priority>0.5</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/privilege-escalation/post-exploitation/windows-post-exploitation/tools/john-the-ripper/conversion</loc>
				<priority>0.42</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/privilege-escalation/post-exploitation/windows-post-exploitation/tools/netcat-ncat</loc>
				<priority>0.5</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/privilege-escalation/post-exploitation/windows-post-exploitation/tools/netcat-ncat/listener-on-recipient</loc>
				<priority>0.42</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/privilege-escalation/post-exploitation/windows-post-exploitation/tools/netcat-ncat/listener-on-sender</loc>
				<priority>0.42</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/privilege-escalation/post-exploitation/windows-post-exploitation/tools/netcat-ncat/page-1</loc>
				<priority>0.42</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/privilege-escalation/linux-priv-esca</loc>
				<priority>0.84</priority>
				<lastmod>2026-02-13T06:54:33.936Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/privilege-escalation/linux-priv-esca/ansible-playbook-privilege-escalation</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-13T06:55:42.199Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/privilege-escalation/linux-priv-esca/apache-conf-privilege-escalation</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-13T06:57:26.738Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/privilege-escalation/linux-priv-esca/bash-eq-privilege-escalation</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-13T06:57:26.693Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/privilege-escalation/linux-priv-esca/buffer-overflow-privilege-escalation</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-13T06:58:55.326Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/privilege-escalation/linux-priv-esca/chrome-remote-debugger-privilege-escalation</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-13T07:00:55.224Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/privilege-escalation/linux-priv-esca/doas-privilege-escalation</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-13T07:00:55.224Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/privilege-escalation/linux-priv-esca/gnuplot-privilege-escalation</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-13T07:02:23.522Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/privilege-escalation/linux-priv-esca/irb-interactive-ruby-shell-privilege-escalation</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-13T07:02:23.522Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/privilege-escalation/linux-priv-esca/lxc-lxd-linux-container-daemon-privilege-escalation</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-13T07:03:54.384Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/privilege-escalation/linux-priv-esca/openssl-privilege-escalation</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-13T07:06:37.852Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/privilege-escalation/linux-priv-esca/pip-download-code-execution</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-13T07:06:37.852Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/privilege-escalation/linux-priv-esca/polkit-privilege-escalation</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-13T07:13:58.019Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/privilege-escalation/linux-priv-esca/python-eval-code-execution</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-13T07:13:58.019Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/privilege-escalation/linux-priv-esca/python-jails-escape</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-13T07:15:32.152Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/privilege-escalation/linux-priv-esca/python-yaml-privilege-escalation</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-13T07:15:32.152Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/privilege-escalation/linux-priv-esca/python-privilege-escalation</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-13T07:17:05.417Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/privilege-escalation/linux-priv-esca/ruby-privilege-escalation</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-13T07:19:23.201Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/privilege-escalation/linux-priv-esca/rust-privilege-escalation</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-13T07:19:23.201Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/privilege-escalation/linux-priv-esca/shared-library-hijacking</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-13T07:26:04.879Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/privilege-escalation/linux-priv-esca/sssd-privilege-escalation</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-13T07:26:04.879Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/privilege-escalation/linux-priv-esca/tar-wildcard-injection-privesc</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-13T07:27:49.182Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/privilege-escalation/linux-priv-esca/update-motd-privilege-escalation</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-13T07:27:49.182Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/privilege-escalation/linux-priv-esca/sudo-privilege-escalation</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-13T07:36:25.939Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/privilege-escalation/linux-priv-esca/sudo-privilege-escalation/sudo-clamav-privilege-escalation</loc>
				<priority>0.59</priority>
				<lastmod>2026-02-13T07:36:25.939Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/privilege-escalation/linux-priv-esca/sudo-privilege-escalation/sudo-curl-privilege-escalation</loc>
				<priority>0.59</priority>
				<lastmod>2026-02-13T07:38:03.137Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/privilege-escalation/linux-priv-esca/sudo-privilege-escalation/sudo-dstat-privilege-escalation</loc>
				<priority>0.59</priority>
				<lastmod>2026-02-13T07:38:03.137Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/privilege-escalation/linux-priv-esca/sudo-privilege-escalation/sudo-exiftool-privilege-escalation</loc>
				<priority>0.59</priority>
				<lastmod>2026-02-13T07:39:19.085Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/privilege-escalation/linux-priv-esca/sudo-privilege-escalation/sudo-fail2ban-client-privilege-escalation</loc>
				<priority>0.59</priority>
				<lastmod>2026-02-13T07:39:19.085Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/privilege-escalation/linux-priv-esca/sudo-privilege-escalation/sudo-fail2ban-privilege-escalation</loc>
				<priority>0.59</priority>
				<lastmod>2026-02-13T07:40:39.627Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/privilege-escalation/linux-priv-esca/sudo-privilege-escalation/sudo-git-privilege-escalation</loc>
				<priority>0.59</priority>
				<lastmod>2026-02-13T07:40:39.627Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/privilege-escalation/linux-priv-esca/sudo-privilege-escalation/sudo-java-privilege-escalation</loc>
				<priority>0.59</priority>
				<lastmod>2026-02-13T07:42:09.037Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/privilege-escalation/linux-priv-esca/sudo-privilege-escalation/sudo-openvpn-privilege-escalation</loc>
				<priority>0.59</priority>
				<lastmod>2026-02-13T07:42:09.018Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/privilege-escalation/linux-priv-esca/sudo-privilege-escalation/sudo-path-traversal-privilege-escalation</loc>
				<priority>0.59</priority>
				<lastmod>2026-02-13T07:43:39.783Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/privilege-escalation/linux-priv-esca/sudo-privilege-escalation/sudo-reboot-privilege-escalation</loc>
				<priority>0.59</priority>
				<lastmod>2026-02-13T07:43:39.783Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/privilege-escalation/linux-priv-esca/sudo-privilege-escalation/sudo-screen-privilege-escalation</loc>
				<priority>0.59</priority>
				<lastmod>2026-02-13T07:45:46.257Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/privilege-escalation/linux-priv-esca/sudo-privilege-escalation/sudo-service-privilege-escalation</loc>
				<priority>0.59</priority>
				<lastmod>2026-02-13T07:45:46.257Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/privilege-escalation/linux-priv-esca/sudo-privilege-escalation/sudo-privilege-escalation-by-overriding-shared-library</loc>
				<priority>0.59</priority>
				<lastmod>2026-02-13T07:47:49.271Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/privilege-escalation/linux-priv-esca/sudo-privilege-escalation/sudo-shutdown-poweroff-privilege-escalation</loc>
				<priority>0.59</priority>
				<lastmod>2026-02-13T07:47:49.271Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/privilege-escalation/linux-priv-esca/sudo-privilege-escalation/sudoedit-privilege-escalation</loc>
				<priority>0.59</priority>
				<lastmod>2026-02-13T07:49:50.493Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/privilege-escalation/linux-priv-esca/sudo-privilege-escalation/sudo-systemctl-privilege-escalation</loc>
				<priority>0.59</priority>
				<lastmod>2026-02-13T07:49:50.493Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/privilege-escalation/linux-priv-esca/sudo-privilege-escalation/sudo-tee-privilege-escalation</loc>
				<priority>0.59</priority>
				<lastmod>2026-02-13T07:51:18.348Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/privilege-escalation/linux-priv-esca/sudo-privilege-escalation/sudo-umount-privilege-escalation</loc>
				<priority>0.59</priority>
				<lastmod>2026-02-13T07:51:18.366Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/privilege-escalation/linux-priv-esca/sudo-privilege-escalation/sudo-vim-privilege-escalation</loc>
				<priority>0.59</priority>
				<lastmod>2026-02-13T07:52:30.632Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/privilege-escalation/linux-priv-esca/sudo-privilege-escalation/sudo-wall-privilege-escalation</loc>
				<priority>0.59</priority>
				<lastmod>2026-02-13T07:52:30.632Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/privilege-escalation/linux-priv-esca/sudo-privilege-escalation/sudo-wget-privilege-escalation</loc>
				<priority>0.59</priority>
				<lastmod>2026-02-13T07:53:01.645Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/privilege-escalation/unix-priv-esca</loc>
				<priority>0.84</priority>
				<lastmod>2026-02-11T13:49:10.224Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/privilege-escalation/window-priv-esca</loc>
				<priority>0.84</priority>
				<lastmod>2026-02-13T06:44:51.698Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/privilege-escalation/window-priv-esca/windows-privilege-escalation</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-14T08:39:48.840Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/privilege-escalation/window-priv-esca/login-windows-shell</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-14T08:50:42.284Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/privilege-escalation/window-priv-esca/dll-hijacking</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-14T08:41:40.464Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/privilege-escalation/window-priv-esca/dumping-credentials-via-keymgr.dll</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-14T08:41:40.464Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/privilege-escalation/window-priv-esca/dumping-credentials-from-windows-vault</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-14T08:47:36.555Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/privilege-escalation/window-priv-esca/dumping-windows-password-hashes</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-14T08:47:36.555Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/privilege-escalation/window-priv-esca/iperius-backup-service-privilege-escalation</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-14T08:48:59.068Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/privilege-escalation/window-priv-esca/localpotato</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-14T08:50:42.284Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/privilege-escalation/window-priv-esca/outlook-reminder-privilege-escalation</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-14T08:53:17.552Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/privilege-escalation/window-priv-esca/registry-keys</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-14T08:53:17.552Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/privilege-escalation/window-priv-esca/remotepotato</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-14T08:54:40.950Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/privilege-escalation/window-priv-esca/windows-privesc-by-abusing-sebackupprivilege</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-14T08:54:40.950Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/privilege-escalation/window-priv-esca/spn-jacking</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-14T08:56:23.539Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/privilege-escalation/window-priv-esca/switch-user-on-windows</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-14T08:56:23.488Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/privilege-escalation/window-priv-esca/uac-bypass</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-14T08:57:33.577Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/privilege-escalation/window-priv-esca/windows-privesc-with-unquoted-service-path</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-14T08:57:33.577Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/privilege-escalation/window-priv-esca/ad-priv-esca</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-13T06:49:54.636Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/privilege-escalation/window-priv-esca/windows-privesc-with-ad-cs</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-14T08:41:40.378Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/privilege-escalation/window-priv-esca/kerberos-privilege-escalation</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-14T08:48:59.068Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/privilege-escalation/window-priv-esca/manageengine-adselfservice-plus-privesc</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-14T08:52:14.624Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/pivoting-lateral-movement/lateral-movement</loc>
				<priority>0.84</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/pivoting-lateral-movement/lateral-movement/linux-lateral-movement</loc>
				<priority>0.7</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/pivoting-lateral-movement/lateral-movement/linux-lateral-movement/kerberos-pass-the-ticket</loc>
				<priority>0.59</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/pivoting-lateral-movement/lateral-movement/linux-lateral-movement/kerberos-pass-the-ticket/ccache-files</loc>
				<priority>0.5</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/pivoting-lateral-movement/lateral-movement/linux-lateral-movement/kerberos-pass-the-ticket/keytab-files</loc>
				<priority>0.5</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/pivoting-lateral-movement/lateral-movement/linux-lateral-movement/kerberos-pass-the-ticket/linikatz</loc>
				<priority>0.5</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/pivoting-lateral-movement/lateral-movement/linux-lateral-movement/kerberos-pass-the-ticket/ccache-abuse</loc>
				<priority>0.5</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/pivoting-lateral-movement/lateral-movement/windows-lateral-movenment</loc>
				<priority>0.7</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/pivoting-lateral-movement/lateral-movement/windows-lateral-movenment/ntlm-pass-the-ticket</loc>
				<priority>0.59</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/pivoting-lateral-movement/lateral-movement/windows-lateral-movenment/kerberos-pass-the-ticket</loc>
				<priority>0.59</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/pivoting-lateral-movement/lateral-movement/windows-lateral-movenment/kerberos-pass-the-ticket/ticket-request</loc>
				<priority>0.5</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/pivoting-lateral-movement/lateral-movement/active-directory-lateral-movement</loc>
				<priority>0.7</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/pivoting-lateral-movement/lateral-movement/active-directory-lateral-movement/rdp</loc>
				<priority>0.59</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/pivoting-lateral-movement/lateral-movement/active-directory-lateral-movement/powershell-removing</loc>
				<priority>0.59</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/pivoting-lateral-movement/lateral-movement/active-directory-lateral-movement/mssql-server</loc>
				<priority>0.59</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/pivoting-lateral-movement/lateral-movement/active-directory-lateral-movement/double-hop-problem</loc>
				<priority>0.59</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/pivoting-lateral-movement/lateral-movement/netexec</loc>
				<priority>0.7</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/pivoting-lateral-movement/lateral-movement/netexec/working-with-modules</loc>
				<priority>0.59</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/pivoting-lateral-movement/lateral-movement/netexec/mapping-and-enumeration-with-smb</loc>
				<priority>0.59</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/pivoting-lateral-movement/lateral-movement/netexec/ldap-and-rdp-enumeration</loc>
				<priority>0.59</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/pivoting-lateral-movement/lateral-movement/netexec/command-excution</loc>
				<priority>0.59</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/pivoting-lateral-movement/lateral-movement/netexec/dumping-secrets</loc>
				<priority>0.59</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/pivoting-lateral-movement/lateral-movement/netexec/popular-modules</loc>
				<priority>0.59</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/pivoting-lateral-movement/lateral-movement/netexec/vulnerbility-scan-modules</loc>
				<priority>0.59</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/pivoting-lateral-movement/lateral-movement/netexec/kerberos-authentication</loc>
				<priority>0.59</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/pivoting-lateral-movement/pivoting</loc>
				<priority>0.84</priority>
				<lastmod>2026-01-25T09:56:38.774Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/pivoting-lateral-movement/pivoting/pivoting-recon</loc>
				<priority>0.7</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/pivoting-lateral-movement/pivoting/local-port-forwarding</loc>
				<priority>0.7</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/pivoting-lateral-movement/pivoting/dynamic-port-forwarding</loc>
				<priority>0.7</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/pivoting-lateral-movement/pivoting/reverse-port-forwarding</loc>
				<priority>0.7</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/pivoting-lateral-movement/pivoting/proxy-chaining</loc>
				<priority>0.7</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/pivoting-lateral-movement/pivoting/proxychains-with-nxc</loc>
				<priority>0.7</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/pivoting-lateral-movement/pivoting/chisel</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-12T04:49:06.562Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/pivoting-lateral-movement/pivoting/ssh</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-12T04:52:46.076Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/pivoting-lateral-movement/pivoting/socat</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-12T04:52:46.076Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/pivoting-lateral-movement/pivoting/plink</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-12T04:54:27.513Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/pivoting-lateral-movement/pivoting/ssh-and-scp</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-10T02:04:12.412Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/pivoting-lateral-movement/pivoting/tools</loc>
				<priority>0.7</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/pivoting-lateral-movement/pivoting/tools/plink</loc>
				<priority>0.59</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/pivoting-lateral-movement/pivoting/tools/sshuttle</loc>
				<priority>0.59</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/pivoting-lateral-movement/pivoting/tools/rpivot</loc>
				<priority>0.59</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/pivoting-lateral-movement/pivoting/tools/netsh</loc>
				<priority>0.59</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/pivoting-lateral-movement/pivoting/tools/dnscat2</loc>
				<priority>0.59</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/pivoting-lateral-movement/pivoting/tools/socat</loc>
				<priority>0.59</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/pivoting-lateral-movement/pivoting/tools/meterpreter</loc>
				<priority>0.59</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/pivoting-lateral-movement/pivoting/tools/socksoverrdp</loc>
				<priority>0.59</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/pivoting-lateral-movement/unix-piv-lateral</loc>
				<priority>0.84</priority>
				<lastmod>2026-02-10T01:46:09.321Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/pivoting-lateral-movement/pivoting-in-linux</loc>
				<priority>0.84</priority>
				<lastmod>2026-02-13T06:37:07.647Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/pivoting-lateral-movement/window-piv-lateral</loc>
				<priority>0.84</priority>
				<lastmod>2026-02-10T15:24:26.521Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/pivoting-lateral-movement/window-piv-lateral/ad-kerberos</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-10T15:59:29.979Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/data-exfiltration/unix-data-exfilt</loc>
				<priority>0.84</priority>
				<lastmod>2026-02-10T02:05:15.671Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/data-exfiltration/backdoors-in-linux</loc>
				<priority>0.84</priority>
				<lastmod>2026-02-13T06:25:29.591Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/data-exfiltration/window-data-exfilt</loc>
				<priority>0.84</priority>
				<lastmod>2026-02-10T15:38:21.055Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/data-exfiltration/window-data-exfilt/ad-impacket</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-10T16:01:41.497Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/persistence/unix-persist</loc>
				<priority>0.84</priority>
				<lastmod>2026-02-10T02:07:14.758Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/persistence/cover-your-tracks-in-linux</loc>
				<priority>0.84</priority>
				<lastmod>2026-02-13T06:27:35.655Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/persistence/window-persist</loc>
				<priority>0.84</priority>
				<lastmod>2026-02-10T15:30:05.940Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/persistence/window-persist/ad-persist</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-10T15:56:50.172Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/network-hacking/apache-hadoop-pentesting</loc>
				<priority>0.84</priority>
				<lastmod>2026-02-12T07:18:30.795Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/network-hacking/arp-address-resolution-protocol-spoofing</loc>
				<priority>0.84</priority>
				<lastmod>2026-02-12T07:20:23.810Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/network-hacking/ethernetip-pentesting</loc>
				<priority>0.84</priority>
				<lastmod>2026-02-12T07:20:23.813Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/network-hacking/fastcgi-pentesting</loc>
				<priority>0.84</priority>
				<lastmod>2026-02-12T07:21:54.381Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/network-hacking/firewall</loc>
				<priority>0.84</priority>
				<lastmod>2026-02-12T07:21:54.381Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/network-hacking/grpc-pentesting</loc>
				<priority>0.84</priority>
				<lastmod>2026-02-12T07:23:42.572Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/network-hacking/redos-regular-expression-denial-of-service</loc>
				<priority>0.84</priority>
				<lastmod>2026-02-12T07:23:42.572Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/network-hacking/rsync-pentesting</loc>
				<priority>0.84</priority>
				<lastmod>2026-02-12T07:24:58.053Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/network-hacking/protocols</loc>
				<priority>0.84</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/network-hacking/protocols/amqp-advanced-message-queuing-protocol</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-12T07:27:44.916Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/network-hacking/protocols/dhcp-dynamic-host-configuration-protocol-pentesting</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-12T07:27:44.916Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/network-hacking/protocols/ftp-file-transfer-protocol-pentesting</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-12T07:30:25.323Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/network-hacking/protocols/irc-internet-relay-chat-pentesting</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-12T07:30:25.330Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/network-hacking/protocols/memcache-pentesting</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-12T07:30:25.300Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/network-hacking/protocols/modbus-pentesting</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-12T07:33:53.051Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/network-hacking/protocols/nfs-network-file-system-pentesting</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-12T07:33:53.051Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/network-hacking/protocols/ntp-network-time-protocol-pentesting</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-12T07:35:23.284Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/network-hacking/protocols/pptp-pentesting</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-12T07:35:23.208Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/network-hacking/protocols/restricted-shell-rbash-rzsh-bypass</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-12T07:36:56.837Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/network-hacking/protocols/rtsp-real-time-streaming-protocol-pentesting</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-12T07:36:56.860Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/network-hacking/protocols/snmp-simple-network-management-protocol-pentesting</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-12T07:38:18.658Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/network-hacking/protocols/ssh-secure-shell-pentesting</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-12T07:41:19.243Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/network-hacking/protocols/telnet-pentesting</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-12T07:41:19.269Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/network-hacking/protocols/tftp-trivial-file-transfer-protocol-pentesting</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-12T07:42:54.238Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/network-hacking/protocols/upnp-universal-plug-and-play-pentesting</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-12T07:42:54.238Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/network-hacking/protocols/vnc-virtual-network-computing-pentesting</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-12T07:44:01.516Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/network-hacking/protocols/waste-pentesting</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-12T07:44:01.516Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/wireless-hacking/wifi-enum</loc>
				<priority>0.84</priority>
				<lastmod>2026-02-12T06:16:32.213Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/wireless-hacking/wifi-exploit</loc>
				<priority>0.84</priority>
				<lastmod>2026-02-11T03:28:14.790Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/wireless-hacking/wifi-priv</loc>
				<priority>0.84</priority>
				<lastmod>2026-02-12T06:19:01.418Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/wireless-hacking/bluetooth</loc>
				<priority>0.84</priority>
				<lastmod>2026-02-17T04:37:47.454Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/wireless-hacking/vpn</loc>
				<priority>0.84</priority>
				<lastmod>2026-02-12T06:13:20.820Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/wireless-hacking/vpn/openvpn-troubleshooting</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-12T06:14:25.612Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/wireless-hacking/audio-tv-hacking</loc>
				<priority>0.84</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/wireless-hacking/audio-tv-hacking/spectrogram</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-12T04:35:21.072Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/wireless-hacking/audio-tv-hacking/sstv-slow-scan-television</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-12T04:35:21.068Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/email-hacking/imap-pentesting</loc>
				<priority>0.84</priority>
				<lastmod>2026-02-12T06:22:14.252Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/email-hacking/pop-pentesting</loc>
				<priority>0.84</priority>
				<lastmod>2026-02-12T06:23:24.185Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/email-hacking/receive-email-as-another-address</loc>
				<priority>0.84</priority>
				<lastmod>2026-02-12T06:24:36.795Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/email-hacking/smtp-pentesting</loc>
				<priority>0.84</priority>
				<lastmod>2026-02-12T06:25:28.474Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/database-hacking/couchdb-pentesting</loc>
				<priority>0.84</priority>
				<lastmod>2026-02-12T03:40:05.336Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/database-hacking/influxdb-pentesting</loc>
				<priority>0.84</priority>
				<lastmod>2026-02-12T03:45:09.259Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/database-hacking/mongodb-pentesting</loc>
				<priority>0.84</priority>
				<lastmod>2026-02-12T03:47:01.824Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/database-hacking/mssql-microsoft-sql-pentesting</loc>
				<priority>0.84</priority>
				<lastmod>2026-02-12T03:49:06.029Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/database-hacking/mysql-pentesting</loc>
				<priority>0.84</priority>
				<lastmod>2026-02-12T03:51:18.642Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/database-hacking/neo4j-pentesting</loc>
				<priority>0.84</priority>
				<lastmod>2026-02-12T03:56:11.059Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/database-hacking/postgresql-pentesting</loc>
				<priority>0.84</priority>
				<lastmod>2026-02-12T03:58:06.757Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/database-hacking/redis-pentesting</loc>
				<priority>0.84</priority>
				<lastmod>2026-02-12T03:59:55.632Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/database-hacking/sqlite-pentesting</loc>
				<priority>0.84</priority>
				<lastmod>2026-02-12T03:59:55.632Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/cloud-hacking/general</loc>
				<priority>0.84</priority>
				<lastmod>2026-01-25T09:22:14.419Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/cloud-hacking/aws</loc>
				<priority>0.84</priority>
				<lastmod>2026-02-12T03:26:54.192Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/cloud-hacking/azure</loc>
				<priority>0.84</priority>
				<lastmod>2026-02-12T03:26:54.192Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/cloud-hacking/gcp</loc>
				<priority>0.84</priority>
				<lastmod>2026-01-25T09:37:22.515Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/cloud-hacking/cdn-comain-fronting</loc>
				<priority>0.84</priority>
				<lastmod>2026-02-10T16:06:40.448Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/cloud-hacking/docker-and-and-kubernetes</loc>
				<priority>0.84</priority>
				<lastmod>2026-01-25T09:39:21.046Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/cloud-hacking/docker-and-and-kubernetes/docker-pentesting</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-12T04:41:29.465Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/cloud-hacking/docker-and-and-kubernetes/docker-engine-api-pentesting</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-12T04:43:14.120Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/cloud-hacking/docker-and-and-kubernetes/docker-escape</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-12T04:56:10.182Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/cloud-hacking/docker-and-and-kubernetes/docker-registry-pentesting</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-12T04:56:10.182Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/cloud-hacking/docker-and-and-kubernetes/moby-docker-engine-privilege-escalation</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-12T04:57:47.208Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/cloud-hacking/docker-and-and-kubernetes/kubernetes-pentesting</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-12T05:00:59.499Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/cloud-hacking/docker-and-and-kubernetes/microk8s-pentesting</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-12T05:02:21.822Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/cloud-hacking/virtual-machine</loc>
				<priority>0.84</priority>
				<lastmod>2026-02-12T04:16:47.028Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/cloud-hacking/git-pentesting</loc>
				<priority>0.84</priority>
				<lastmod>2026-02-12T08:25:38.480Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/cloud-hacking/gitea-pentesting</loc>
				<priority>0.84</priority>
				<lastmod>2026-02-12T08:27:44.107Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/cloud-hacking/gogs-pentesting</loc>
				<priority>0.84</priority>
				<lastmod>2026-02-12T08:26:49.421Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/ai-hacking/ai-prompt-injection</loc>
				<priority>0.84</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/ai-hacking/attack_techniques</loc>
				<priority>0.84</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/ai-hacking/attack_techniques/act_as_interpreter</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-26T02:57:12.244Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/ai-hacking/attack_techniques/anti_harm_coercion</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-26T03:07:40.934Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/ai-hacking/attack_techniques/ascii</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-26T03:11:06.872Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/ai-hacking/attack_techniques/binary_streams</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-26T03:11:06.872Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/ai-hacking/attack_techniques/cognitive_overload</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-26T03:13:03.490Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/ai-hacking/attack_techniques/contradiction</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-26T03:14:06.495Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/ai-hacking/attack_techniques/end_sequences</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-26T03:14:06.495Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/ai-hacking/attack_techniques/framing-narrative-injection</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-26T03:30:19.777Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/ai-hacking/attack_techniques/inversion</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-26T03:32:28.749Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/ai-hacking/attack_techniques/link_injection</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-26T03:34:08.341Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/ai-hacking/attack_techniques/memory_exploitation</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-26T03:44:27.257Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/ai-hacking/attack_techniques/meta_prompting</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-26T03:45:28.966Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/ai-hacking/attack_techniques/narrative_smuggling</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-26T03:46:31.085Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/ai-hacking/attack_techniques/puzzling</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-26T03:46:31.085Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/ai-hacking/attack_techniques/rule_addition</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-26T03:48:23.855Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/ai-hacking/attack_techniques/russian_doll</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-26T03:52:35.870Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/ai-hacking/attack_techniques/spatial_byte_arrays</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-26T03:54:39.513Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/ai-hacking/attack_techniques/variable_expansion</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-26T03:57:33.720Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/ai-hacking/attack_evasions</loc>
				<priority>0.84</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/ai-hacking/attack_evasions/alt_language</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-26T03:59:21.110Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/ai-hacking/attack_evasions/base64</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-26T04:02:13.661Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/ai-hacking/attack_evasions/case_changing</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-26T04:04:45.221Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/ai-hacking/attack_evasions/cipher</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-26T04:07:31.208Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/ai-hacking/attack_evasions/emoji</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-26T04:08:43.302Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/ai-hacking/attack_evasions/fictional_language</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-26T04:15:00.807Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/ai-hacking/attack_evasions/graph_nodes</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-26T04:16:26.093Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/ai-hacking/attack_evasions/hex</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-26T04:18:00.643Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/ai-hacking/attack_evasions/json</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-26T04:19:43.812Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/ai-hacking/attack_evasions/link_smuggling</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-26T04:21:17.862Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/ai-hacking/attack_evasions/markdown</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-26T04:23:03.410Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/ai-hacking/attack_evasions/metacharacter_confusion</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-26T04:24:46.377Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/ai-hacking/attack_evasions/morse</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-26T04:29:29.351Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/ai-hacking/attack_evasions/phoenetic_substitution</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-26T04:31:21.898Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/ai-hacking/attack_evasions/reverse</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-26T04:34:10.636Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/ai-hacking/attack_evasions/spaces</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-26T04:36:13.147Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/ai-hacking/attack_evasions/splats</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-26T04:36:13.147Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/ai-hacking/attack_evasions/stego</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-26T04:38:45.906Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/ai-hacking/attack_evasions/waveforms</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-26T04:40:09.624Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/ai-hacking/attack_evasions/xml</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-26T04:41:28.255Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/ai-hacking/attack_intents</loc>
				<priority>0.84</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/ai-hacking/attack_intents/api_enumeration</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-25T10:53:17.592Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/ai-hacking/attack_intents/attack_users</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-25T13:22:19.371Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/ai-hacking/attack_intents/business_integrity</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-25T13:44:30.335Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/ai-hacking/attack_intents/data_poisoning</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-25T13:48:53.458Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/ai-hacking/attack_intents/denial_of_service</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-25T13:51:21.584Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/ai-hacking/attack_intents/discuss_harm</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-25T13:53:54.526Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/ai-hacking/attack_intents/account_access</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-25T14:00:39.231Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/ai-hacking/attack_intents/generate_image</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-25T14:18:29.745Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/ai-hacking/attack_intents/discounts</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-25T14:22:04.069Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/ai-hacking/attack_intents/get_prompt_secret</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-25T14:25:50.101Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/ai-hacking/attack_intents/jailbreak</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-25T15:41:38.787Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/ai-hacking/attack_intents/returns_refunds</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-25T15:41:38.787Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/ai-hacking/attack_intents/multi_chain_attacks</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-25T15:43:38.799Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/ai-hacking/attack_intents/system_prompt_leak</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-25T15:45:02.776Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/ai-hacking/attack_intents/test_bias</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-25T15:46:14.253Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/ai-hacking/attack_intents/tool_enumeration</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-25T15:48:52.613Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/ai-hacking/attack_intents/confidential_info</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-25T15:49:24.374Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/ai-hacking/ai_enabled_app_defense_checklist</loc>
				<priority>0.84</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/ai-hacking/ai_sec_questionnaire</loc>
				<priority>0.84</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/ai-hacking/ai_threat_model_questions</loc>
				<priority>0.84</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/ai-hacking/llm-ai-ml-prompt-testing</loc>
				<priority>0.84</priority>
				<lastmod>2026-01-25T10:31:15.035Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/machine-learning-hacks/jupyter-notebook-pentesting</loc>
				<priority>0.84</priority>
				<lastmod>2026-02-12T06:34:58.957Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/machine-learning-hacks/orange-data-mining</loc>
				<priority>0.84</priority>
				<lastmod>2026-02-12T06:36:31.890Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/machine-learning-hacks/read-hdf5-h5-file</loc>
				<priority>0.84</priority>
				<lastmod>2026-02-12T06:37:52.598Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/machine-learning-hacks/read-pt-file</loc>
				<priority>0.84</priority>
				<lastmod>2026-02-12T06:37:52.598Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/machine-learning-hacks/read-pt-file-1</loc>
				<priority>0.84</priority>
				<lastmod>2026-02-12T06:39:09.630Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/machine-learning-hacks/computer-vision</loc>
				<priority>0.84</priority>
				<lastmod>2026-02-12T06:40:53.892Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/machine-learning-hacks/computer-vision/image-manipulation-for-machine-learning</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-12T06:40:53.892Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/machine-learning-hacks/computer-vision/image-recognition-bypass-for-machine-learning</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-12T06:42:21.524Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/machine-learning-hacks/data-processing</loc>
				<priority>0.84</priority>
				<lastmod>2026-02-12T06:43:42.351Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/machine-learning-hacks/data-processing/data-manipulation-for-machine-learning</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-12T06:45:49.434Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/machine-learning-hacks/data-processing/data-visualization-for-machine-learning</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-12T06:45:49.434Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/machine-learning-hacks/data-processing/dimensionality-reduction-for-machine-learning</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-12T06:47:08.683Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/machine-learning-hacks/create-malicious-ml-model</loc>
				<priority>0.84</priority>
				<lastmod>2026-02-12T06:51:48.413Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/machine-learning-hacks/create-malicious-ml-model/model-analysis</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-12T06:52:49.631Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/machine-learning-hacks/create-malicious-ml-model/pickle-code-injection</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-12T06:52:49.631Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/code-hacking/code-review</loc>
				<priority>0.84</priority>
				<lastmod>2026-01-25T10:32:26.547Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/code-hacking/sinks</loc>
				<priority>0.84</priority>
				<lastmod>2026-02-05T13:59:21.672Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/mobile-hacking/general</loc>
				<priority>0.84</priority>
				<lastmod>2026-01-25T10:21:32.564Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/mobile-hacking/android</loc>
				<priority>0.84</priority>
				<lastmod>2026-02-12T06:28:05.759Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/mobile-hacking/android/connect-to-android-device-from-pc-using-ssh</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-12T06:30:27.946Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/mobile-hacking/ios</loc>
				<priority>0.84</priority>
				<lastmod>2026-01-25T10:25:03.225Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/blockchain-hacking/ethereum</loc>
				<priority>0.84</priority>
				<lastmod>2026-02-12T04:19:39.579Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/blockchain-hacking/ethereum/interact-with-ethereum-using-python</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-12T04:21:20.158Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/blockchain-hacking/attack-methodology</loc>
				<priority>0.84</priority>
				<lastmod>2026-02-12T04:23:25.533Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/blockchain-hacking/attack-methodology/contract-address-recovery</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-12T04:24:41.836Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/blockchain-hacking/attack-methodology/delegatecall-attack</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-12T04:24:41.869Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/blockchain-hacking/attack-methodology/dos-attack-for-smart-contract</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-12T04:26:20.576Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/blockchain-hacking/attack-methodology/reentrancy-attack</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-12T04:26:20.576Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/blockchain-hacking/attack-methodology/self-destruct-attack</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-12T04:27:35.167Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/blockchain-hacking/attack-methodology/solidity-assembly</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-12T04:27:35.167Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/blockchain-hacking/attack-methodology/solidity-overflow-and-underflow</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-12T04:28:54.388Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/blockchain-hacking/attack-methodology/solidity-storage-values-analysis</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-12T04:28:54.388Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/blockchain-hacking/attack-methodology/tx-origin-attack</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-12T04:30:12.188Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/cryptography-hacking/cryptography-basic</loc>
				<priority>0.84</priority>
				<lastmod>2026-02-21T07:29:15.767Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/cryptography-hacking/password-safe-pentesting</loc>
				<priority>0.84</priority>
				<lastmod>2026-02-12T09:01:27.797Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/cryptography-hacking/powershell-credentials</loc>
				<priority>0.84</priority>
				<lastmod>2026-02-12T08:36:25.786Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/cryptography-hacking/john-the-ripper</loc>
				<priority>0.84</priority>
				<lastmod>2026-02-12T09:00:54.981Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/cryptography-hacking/algorithim-pentesting</loc>
				<priority>0.84</priority>
				<lastmod>2026-02-12T08:38:35.385Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/cryptography-hacking/algorithim-pentesting/aes-cbc-padding-oracle-attack</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-12T08:38:35.385Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/cryptography-hacking/algorithim-pentesting/aes-ecb-padding-attack</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-12T08:40:02.701Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/cryptography-hacking/algorithim-pentesting/ansible-vault-secret</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-12T08:41:36.417Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/cryptography-hacking/algorithim-pentesting/atbash-cipher</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-12T08:41:36.417Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/cryptography-hacking/algorithim-pentesting/des-data-encryption-standard</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-12T08:42:41.148Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/cryptography-hacking/algorithim-pentesting/diffie-hellman-key-exchange</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-12T08:43:45.847Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/cryptography-hacking/algorithim-pentesting/gpg-gnu-privacy-guard</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-12T08:45:14.628Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/cryptography-hacking/algorithim-pentesting/kdbx-files</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-12T08:45:14.632Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/cryptography-hacking/algorithim-pentesting/kerberos-tgt-cracking</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-12T08:46:37.771Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/cryptography-hacking/algorithim-pentesting/ntlm-ntlmv2</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-12T08:46:37.771Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/cryptography-hacking/algorithim-pentesting/pgp-pretty-good-privacy</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-12T08:47:51.292Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/cryptography-hacking/algorithim-pentesting/pkcs-public-key-cryptography-standards</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-12T08:47:51.161Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/cryptography-hacking/algorithim-pentesting/rot13-rot47</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-12T08:47:51.292Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/cryptography-hacking/algorithim-pentesting/rpng-pseudo-random-number-generator-guessing</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-12T08:49:18.906Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/cryptography-hacking/algorithim-pentesting/rsa-rivest-shamir-adleman</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-12T08:49:18.906Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/cryptography-hacking/algorithim-pentesting/sha1-hash-collision-attack</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-12T08:50:53.414Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/cryptography-hacking/algorithim-pentesting/sha1-sha256-sha512</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-12T08:51:56.195Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/cryptography-hacking/key-derivation</loc>
				<priority>0.84</priority>
				<lastmod>2026-02-12T08:53:24.157Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/cryptography-hacking/key-derivation/pbkdf2</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-12T08:54:24.992Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/cryptography-hacking/key-derivation/scrypt</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-12T08:54:24.992Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/cryptography-hacking/math</loc>
				<priority>0.84</priority>
				<lastmod>2026-02-12T08:56:08.138Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/cryptography-hacking/math/exponentiation</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-12T08:56:08.138Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/cryptography-hacking/math/gcd-greatest-common-divisor</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-12T08:57:55.216Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/cryptography-hacking/math/modular-congruence</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-12T08:57:55.216Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/cryptography-hacking/math/quadratic-residue</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-12T08:59:28.932Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/iot-hacking/printer-pentesting</loc>
				<priority>0.84</priority>
				<lastmod>2026-02-12T06:59:49.110Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/iot-hacking/ipp-internet-printing-protocol-pentesting</loc>
				<priority>0.84</priority>
				<lastmod>2026-02-12T07:00:52.676Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/hardware-hacking/flipper-zero</loc>
				<priority>0.84</priority>
				<lastmod>2026-02-17T12:31:13.492Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/hardware-hacking/flipper-zero/signal-reading</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-17T10:53:03.063Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/hardware-hacking/flipper-zero/rfid-card-reading</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-17T11:28:30.777Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/hardware-hacking/flipper-zero/key-extraction-with-mfkey32</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-17T11:34:29.587Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/hardware-hacking/flipper-zero/unlocking-cards-with-passwords</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-17T11:46:40.052Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/hardware-hacking/flipper-zero/writing-data-on-magic-cards</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-17T11:48:30.812Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/hardware-hacking/flipper-zero/bad-usb</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-17T11:54:59.921Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/hardware-hacking/flipper-zero/pin-bruteforce</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-17T11:58:18.834Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/hardware-hacking/flipper-zero/ratlocker</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-17T12:01:29.764Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/hardware-hacking/flipper-zero/wifi-password-cracking</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-17T12:17:48.959Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/hardware-hacking/flipper-zero/evil-portal</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-17T12:21:02.687Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/hardware-hacking/firmware-analysis</loc>
				<priority>0.84</priority>
				<lastmod>2026-02-12T07:04:09.606Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/hardware-hacking/gerber-gbr-files</loc>
				<priority>0.84</priority>
				<lastmod>2026-02-12T07:04:09.708Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/hardware-hacking/mqtt-pentesting</loc>
				<priority>0.84</priority>
				<lastmod>2026-02-12T07:05:42.032Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/hardware-hacking/netgear-pentesting</loc>
				<priority>0.84</priority>
				<lastmod>2026-02-12T07:05:42.016Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/hardware-hacking/sal-logic-analysis</loc>
				<priority>0.84</priority>
				<lastmod>2026-02-12T07:06:06.535Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/writeups/thm-walkthroughs</loc>
				<priority>0.84</priority>
				<lastmod>2026-02-16T16:30:04.634Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/writeups/htb-walkthroughs</loc>
				<priority>0.84</priority>
				<lastmod>2026-02-17T08:01:53.631Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/writeups/oscp-preparation</loc>
				<priority>0.84</priority>
				<lastmod>2026-02-16T16:39:48.492Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/writeups/crtp-prepration</loc>
				<priority>0.84</priority>
				<lastmod>2026-02-17T13:38:20.260Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/writeups/labs-writeups</loc>
				<priority>0.84</priority>
				<lastmod>2026-02-18T09:01:29.070Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/writeups/blogs-gitbooks-links</loc>
				<priority>0.84</priority>
				<lastmod>2026-02-18T10:11:47.330Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/writeups/portswigger-writeups</loc>
				<priority>0.84</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/writeups/portswigger-writeups/sqli-labs-solution</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-04T15:46:00.237Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/writeups/portswigger-writeups/client-side</loc>
				<priority>0.7</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/writeups/portswigger-writeups/client-side/cross-origin-resource-sharing-cors</loc>
				<priority>0.59</priority>
				<lastmod>2026-02-20T10:20:16.224Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/writeups/portswigger-writeups/client-side/cross-site-request-forgery-csrf-cookie</loc>
				<priority>0.59</priority>
				<lastmod>2026-02-20T10:20:16.224Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/writeups/portswigger-writeups/client-side/cross-site-request-forgery-csrf-token</loc>
				<priority>0.59</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/writeups/portswigger-writeups/client-side/cross-site-scripting-xss</loc>
				<priority>0.59</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/writeups/portswigger-writeups/client-side/dom-based</loc>
				<priority>0.59</priority>
				<lastmod>2026-02-20T10:19:24.131Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/writeups/portswigger-writeups/client-side/websocket</loc>
				<priority>0.59</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/writeups/portswigger-writeups/server-side</loc>
				<priority>0.7</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/writeups/portswigger-writeups/server-side/access-control-vulnerabilities-and-privilege-escalation</loc>
				<priority>0.59</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/writeups/portswigger-writeups/server-side/api-testing</loc>
				<priority>0.59</priority>
				<lastmod>2026-02-20T10:14:14.604Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/writeups/portswigger-writeups/server-side/authentication-vulnerabilities</loc>
				<priority>0.59</priority>
				<lastmod>2026-02-20T10:12:47.485Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/writeups/portswigger-writeups/server-side/business-logic-vulnerabilities</loc>
				<priority>0.59</priority>
				<lastmod>2026-02-20T10:14:14.604Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/writeups/portswigger-writeups/server-side/file-upload-vulnerabilities</loc>
				<priority>0.59</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/writeups/portswigger-writeups/server-side/information-disclosure-vulnerabilities</loc>
				<priority>0.59</priority>
				<lastmod>2026-02-20T10:14:14.582Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/writeups/portswigger-writeups/server-side/nosql-injection</loc>
				<priority>0.59</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/writeups/portswigger-writeups/server-side/oauth-authentication</loc>
				<priority>0.59</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/writeups/portswigger-writeups/server-side/os-command-injection</loc>
				<priority>0.59</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/writeups/portswigger-writeups/server-side/path-traversal</loc>
				<priority>0.59</priority>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/writeups/portswigger-writeups/server-side/race-condition</loc>
				<priority>0.59</priority>
				<lastmod>2026-02-20T10:18:07.540Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/writeups/portswigger-writeups/server-side/server-side-request-forgery-ssrf</loc>
				<priority>0.59</priority>
				<lastmod>2026-02-20T10:18:07.528Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/writeups/portswigger-writeups/server-side/sql-injection</loc>
				<priority>0.59</priority>
				<lastmod>2026-02-20T10:18:07.540Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/writeups/portswigger-writeups/server-side/xxe-injection-xml-external-entity</loc>
				<priority>0.59</priority>
				<lastmod>2026-02-20T10:09:00.795Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/bugbounty/bugbounty-methodology</loc>
				<priority>0.84</priority>
				<lastmod>2026-02-20T09:58:43.365Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/bugbounty/bugbounty-resources</loc>
				<priority>0.84</priority>
				<lastmod>2026-02-18T13:56:43.585Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/tools/privacy</loc>
				<priority>0.84</priority>
				<lastmod>2026-02-12T04:14:36.922Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/tools/steganography</loc>
				<priority>0.84</priority>
				<lastmod>2026-02-12T08:19:47.150Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/tools/steganography/image-file-reparing</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-12T08:22:13.094Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/tools/steganography/morse-ocr</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-12T08:22:13.094Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/tools/password-cracking</loc>
				<priority>0.84</priority>
				<lastmod>2026-02-11T03:03:10.180Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/tools/password-cracking/gathering-the-hashes</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-11T03:05:06.349Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/tools/password-cracking/wordlist-manipulation</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-11T03:06:48.258Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/tools/password-cracking/cracking-the-hashes</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-11T03:17:45.338Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/tools/windows-tools</loc>
				<priority>0.84</priority>
				<lastmod>2026-01-25T10:06:17.767Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/tools/windows-tools/kerberos</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-25T10:12:25.151Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/tools/windows-tools/ps-tips-and-tricks</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-25T10:19:27.850Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/tools/windows-tools/active-directory</loc>
				<priority>0.7</priority>
				<lastmod>2026-01-25T10:09:05.520Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/tools/burp-suite</loc>
				<priority>0.84</priority>
				<lastmod>2026-01-25T10:26:18.707Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/tools/burp-suite/add-custom-http-headers-in-burp-suite</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-13T11:34:55.709Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/tools/burp-suite/automate-sequence-requests-with-burp-intruder</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-13T11:34:55.709Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/tools/burp-suite/burp-suite-troubleshooting</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-13T11:36:03.328Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/tools/burp-suite/socks-proxy-in-burp-suite</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-13T11:36:03.328Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/tools/burp-suite/turbo-intruder-in-burp-suite</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-13T11:36:36.075Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/tools/scripting</loc>
				<priority>0.84</priority>
				<lastmod>2026-02-11T03:42:06.508Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/tools/scripting/script-language-syntax</loc>
				<priority>0.7</priority>
				<lastmod>2026-02-11T08:22:13.213Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/tools/red-team-resources</loc>
				<priority>0.84</priority>
				<lastmod>2026-01-26T15:24:07.869Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/tools/hacking-tools</loc>
				<priority>0.84</priority>
				<lastmod>2026-02-19T09:40:23.822Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/tools/internal-pentest</loc>
				<priority>0.84</priority>
				<lastmod>2026-01-25T10:34:38.779Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/tools/report-template</loc>
				<priority>0.84</priority>
				<lastmod>2026-02-06T00:29:56.097Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/tools/random</loc>
				<priority>0.84</priority>
				<lastmod>2026-01-25T10:36:53.240Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/tools/wireshark-cheat-sheet</loc>
				<priority>0.84</priority>
				<lastmod>2026-02-12T07:58:09.878Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/tools/tshark-cheat-sheet</loc>
				<priority>0.84</priority>
				<lastmod>2026-02-12T07:56:43.968Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/tools/master-assessment-mindmaps</loc>
				<priority>0.84</priority>
				<lastmod>2026-02-20T05:25:27.314Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/tools/convert-putty-key-to-openssh-key</loc>
				<priority>0.84</priority>
				<lastmod>2026-02-12T07:55:06.197Z</lastmod>
</url>

			<url>
				<loc>https://hamcodes.gitbook.io/hackersnotes/tools/decrypt-solarputty-sessions-files</loc>
				<priority>0.84</priority>
				<lastmod>2026-02-12T07:55:06.197Z</lastmod>
</url>


</urlset>
